CCNA-Practice Test 6


Directions: For each of the following questions, select the choice that best answers the question or completes the statement.

1. 

Which of the following commands will display "Unauthorized access prohibited!" before the login prompt when someone initiates a Telnet session to a router?

  1.  login banner x Unauthorized access prohibited! x 

  2.  banner exec y Unauthorized access prohibited! y 

  3.  banner motd x Unauthorized access prohibited!" x 

  4.  login message "Unauthorized access prohibited!" 

image from book

2. 

What wildcard mask should be used with a network address that has a range of 172.16.16.0 through 172.16.31.0?

  1. 0.0.15.255

  2. 0.0.255.255

  3. 0.255.255.255

  4. 0.0.0.31

image from book

3. 

A router on one side of a PPP link uses the hostname RT-Denver and the password globalnet. Which command should be entered on RT-Denver to enable a connection between RT-Denver and another router named RT-Dallas?

  1.  Router#username RT-Dallas password globalnet 

  2.  Router(config)#username RT- Dallas password globalnet 

  3.  Router#username globalnet password RT-Dallas 

  4.  Router(config)#username globalnet password RT-Dallas 

image from book

4. 

Look at the following diagram. Assume that the RT-Houston router has already been configured with RIP. Which of the following series of commands will enable and configure RIP routing on the RT-Dallas router?

  1.  RT-Dallas(config)#router rip 100 RT-Dallas(config-router)# network 10.0.0.0 RT-Dallas(config-router)# network 172.16.0.0 

  2.  RT-Dallas(config)#router rip RT-Dallas(config-router)# network 10.0.0.0 RT-Dallas(config-router)# network 172.16.0.0 

  3.  RT-Dallas(config)#router rip RT-Dallas(config-router)# interface ethernet 0 RT-Dallas(config-if)#ip address 10.1.1.1 255.255.255.0 RT-Dallas(config-if)# network 10.0.0.0 RT-Dallas(config-if)#interface serial 1 RT-Dallas(config-if)#ip address 172.16.1.1 255.255.255.0 RT-Dallas(config-if)#network 172.16.0.0 

  4.  RT-Dallas(config)#router rip RT-Dallas(config-router)# interface ethernet 0 RT-Dallas(config-if)#ip address 172.16.1.1 255.255.255.0 RT-Dallas(config-if)#network 172.16.0.0 RT-Dallas(config-if)#interface serial 1 RT-Dallas(config-if)#ip address 10.1.1.1 255.255.255.0 RT-Dallas(config-if)#network 10.0.0.0 

image from book
Figure 6-1

image from book

5. 

Which of the following are advantages of using routers in your network? (Choose three.)

  1. Limit scope of broadcast storms

  2. Reduce downtime on your network

  3. Route between VLANs

  4. Filter traffic based on logical addresses

image from book

6. 

Look at the following diagram. Suppose that all routing has already been configured using EIGRP and is working properly. Additionally, suppose that the following line has been added to RT-Miami:

         IP Route 192.168.2.0               255.255.255.0         10.1.1.2 

image from book
Figure 6-2

Which of the following will happen?

  1. The Miami LAN will lose access to the Denver LAN.

  2. The Denver LAN will lose access to the Miami LAN.

  3. Both of the above.

  4. None of the above.

image from book

7. 

Which of the following is a benefit of segmenting your network with switches?

  1. Each port on a switch acts like a router interface.

  2. Switches provide bridging functionality at wire speed.

  3. Switches regenerate the digital signal at each hop.

  4. Switches stop broadcast storms by default.

image from book

8. 

When using Frame Relay, what is the purpose of Inverse ARP?

  1. Map a known IP address to a MAC address

  2. Map a known IP addresses to a DLCI

  3. Map a known IP addresses to Multicast addresses

  4. Map a known IP address to LMI

b explanation: b. inverse arp maps a known ip address to a local dlci.

9. 

You need a routing protocol that provides discontiguous network and VLSM support. It must also provide the lowest impact on router CPU and WAN utilization. Which of the following will meet these needs?

  1. RIPv1

  2. RIPv2

  3. Static routing

  4. EIGRP

  5. OSPF

image from book

10. 

You are designing a WAN that will span seven sites. You must allow full-mesh communication of up to T1 speeds. Which of the following will most efficiently meet these requirements?

  1. PPP

  2. Frame Relay

  3. ISDN BRI

  4. OSPF

  5. Point-to-point links

image from book

11. 

Look at the following diagram. You have been asked to prevent the Dallas LAN from accessing web services on the Houston LAN. Which wildcard should be used to describe the entire Dallas LAN 10.1.1.1/24 in the access control list?

  1. 255.255.255.0

  2. 255.0.0.0

  3. 0.0.0.254

  4. 0.0.0.255

  5. 0.0.0.8

image from book
Figure 6-1

image from book

12. 

Look at the following diagram. This small branch has a single /24 Internet routable network assigned, and it has been properly subnetted and assigned to the network segments. Which routing protocol is recommended to run between the branch and ISP routers?

  1. Static routing

  2. EIGRP

  3. OSPF

  4. BGP

  5. Default routing

image from book
Figure 6-3

image from book

13. 

Which statement describes the switch ports in a spanning-tree network that has converged?

  1. All switch ports are in the forwarding state.

  2. All switch ports are assigned as either root or designated ports.

  3. All switch ports are in either the forwarding or the blocking state.

  4. All switch ports are either blocking or looping.

image from book

14. 

Which protocol is used to resolve an IP address to an Ethernet address?

  1. Inverse ARP

  2. Reverse ARP

  3. Interior ARP

  4. ARP

image from book

15. 

Look at the following diagram. When you are configuring these routers, the Miami router goes well. However, when you attempt to add the IP address to the Denver router's Ethernet 1 interface you get an error stating Bad Mask /26 for address 192.168.1.1. What is the likely cause of this problem?

  1. You first need to add the 192.168.1.0 subnet to the routing protocol on the Miami router.

  2. You must add the Ethernet interface address before the serial interface address.

  3. You must add the no auto-summary command to your routing protocol on the Denver router.

  4. You must add the ip subnet-zero command to the Denver router.

image from book
Figure 6-4

image from book

16. 

You are at a client's site, trying to detect the source of network trouble. While using a protocol analyzer, you note the presence of BPDU frames. What is the role of BPDU frames in a network environment?

  1. BPDUs are unicast frames sent among all network connectivity devices. They contain spanning-tree algorithm information.

  2. BPDUs are multicast frames that contain the bridge ID of the source device, which is used in spanning-tree algorithm calculations.

  3. BPDUs are broadcast frames used by switches to encapsulate routing protocol information.

  4. BPDUs are multicast frames used by switches to encapsulate routing protocol information.

image from book

17. 

Which of these sentences are true regarding the following output? (Choose two.)

Code Listing 6-1

image from book
 04:06:16: RIP: received v1 update from 192.168.40.2 on   Serial0/1 04:06:16:      192.168.50.0 in 16 hops (inaccessible) 04:06:40: RIP: sending v1 update to 255.255.255.255    via FastEthernet0/0 (192.168.30.1) 04:06:40: RIP: build update entries 04:06:40:       network 192.168.20.0 metric 1 04:06:40:       network 192.168.40.0 metric 1 04:06:40:       network 192.168.50.0 metric 2 04:06:40: RIP: sending v1 update to 255.255.255.255 via Serial0/1   (192.168.40.1) 
image from book

  1. Three interfaces on the router are participating in this update.

  2. A ping to 192.168.50.1 will be successful.

  3. At least two routers are exchanging information.

  4. A ping to 192.168.40.2 will be successful.

image from book

18. 

Look at the following diagram. Assume all switches are running spanning tree. Which switch will be elected root bridge?

  1. Switch A

  2. Switch B

  3. Switch C

image from book
Figure 6-5

image from book

19. 

Look at the following diagram. You have been asked to add configuration to the RT-Denver router preventing any hosts on the 192.168.1.0/24 network from accessing web sites on the Internet. What protocol, wildcard mask, and port should you use in the following command?

 Ip access-list 151 deny [protocol]     192.168.1.0    [wildcard mask] any eq [port] 

  1. ip, 255.255.255.0, 80

  2. ip, 0.0.0.255, web

  3. tcp, 0.0.0.255, 80

  4. tcp, 255.255.255.0, web

image from book
Figure 6-6

image from book

20. 

What is the possible problem determined from the following output?

Code Listing 6-2

image from book
 RouterA#sh int s0 Serial0 is up, line protocol is down 
image from book

  1. The keepalives could be set wrong between the point-to-point links.

  2. No cable is attached to the interface.

  3. The administrator needs to issue a no shutdown request to the interface.

  4. Inverse ARP is not enabled.

image from book

21. 

Look at the following diagram. What kind of device is required between the two devices to allow hosts on the two VLANs to communicate with each other?

  1. Another switch

  2. Another switch, using crossover cables

  3. A router

  4. A bridge

image from book
Figure 6-7

image from book

22. 

How do you create a default route on a router?

  1. Define a static route, and use all ones in place of the destination network and mask.

  2. Define a static route, and use all zeros in place of the destination network and mask.

  3. Define a static route, and use the keyword default in place of the destination network and mask.

  4. Add the network statement 0.0.0.0 to the routing protocol.

image from book

23. 

What is the broadcast address of the subnet 192.168.99.20/30?

  1. 192.168.99.127

  2. 192.168.99.63

  3. 192.168.99.23

  4. 192.168.99.31

image from book

24. 

The OSPF Hello protocol performs which of the following tasks? (Choose two.)

  1. It provides dynamic neighbor discovery.

  2. It detects unreachable neighbors at 90-second intervals.

  3. It maintains neighbor relationships.

  4. It uses timers to elect the router with the fastest link as the designated router.

image from book

25. 

You can ping a router, but you can't telnet to it. What could the problem be?

  1. IP is not configured correctly.

  2. TCP is not configured correctly.

  3. You didn't set the password on the router for Telnet access.

  4. The default gateway on the PC is not correct.

  5. The default gateway on the router is not correct.

image from book

26. 

Look at the following diagram. Suppose you issue a show cdp neighbor command on Switch A, and you see Switch B but not Switch C. What could be the problem? (Choose two.)

  1. Bad cable

  2. Misconfigured IP address on Switch C

  3. Bad switchport

  4. All of the above

image from book
Figure 6-5

image from book

27. 

A routing table contains static, RIP, OSPF, and EIGRP routes for the same remote network. Which one will the router use by default?

  1. EIGRP

  2. RIP

  3. OSPF

  4. Static

image from book

28. 

What is the Frame Relay map command used for?

  1. To identify the hardware address of the local interface

  2. To identify the virtual circuit

  3. To map a DLCI address to an IP address

  4. To route packets in the Frame Relay PVC

image from book

29. 

Your supervisor has asked that you prevent Telnet traffic originating from the Internet from entering your network. You decide to create an inbound access-list filter on the interface that connects to the Internet. Which of the following is correct?

  1.  ip access-list 75 deny telnet any any 

  2.  ip access-list 101 deny ip any any eq telnet 

  3.  ip access-list 75 deny tcp any any eq telnet 

  4.  ip access-list 101 deny tcp any any eq telnet 

image from book

30. 

An Ethernet interface has been configured with an IP address of 184.26.29.78 and a subnet mask of 255.255.240.0. IP routing has been enabled. Which of the following entries will appear in the router's IP routing table?

  1.  C  184.26.0.0 is directly connected, Ethernet0 

  2.  C  184.26.29.16 is directly connected, Ethernet0 

  3.  C  184.26.29.78 is directly connected, Ethernet0 

  4.  C  184.26.16.0 is directly connected, Ethernet0 

image from book

31. 

What is the default configuration register setting for a Cisco router?

  1. 0x102

  2. 0x2102

  3. 0x1000

  4. 0x0000

image from book

32. 

When a switch is first powered on, the spanning-tree algorithm transitions all ports through several states. Identify the correct series of states.

  1. Learning, listening, blocking or forwarding

  2. Learning, listening, disabled or forwarding

  3. Listening, learning, blocking or forwarding

  4. Blocking, listening, learning, blocking or forwarding

image from book

33. 

What will the following command do when placed on a router?

 Ip route 0.0.0.0 0.0.0.0 serial1 

  1. Override the routes learned by any routing protocol

  2. Override the routes learned by any routing protocol on interface serial1

  3. Forward all traffic out interface serial1

  4. Forward all traffic where the destination route is unknown out interface serial1

image from book

34. 

Your boss tells you to configure a classful routing protocol on your Cisco router. Which of the following routing protocols will provide the business solution? (Choose 3)

  1. RIP

  2. EIGRP

  3. IGRP

  4. OSPF

  5. RIPv2

image from book
Figure 6-8

image from book

35. 

Look at the following diagram. The host on VLAN 2 is able to access the Internet but cannot ping the host on VLAN 3. Which of the following is the problem?

  1. The router address on VLAN 2

  2. The host's address on VLAN 2

  3. The router address on VLAN 3

  4. The host's address on VLAN 3

  5. The 802.1q trunk link configuration

image from book
Figure 6-8

d explanation: d. the host on vlan 3 has an ip address assigned that belongs to vlan 2.

36. 

Look at the following diagram. SwitchC suffered a hardware failure; you replaced it with a spare switch that you had in inventory. You replaced the configuration but noticed that as soon as you added it to the network, SwitchA and SwitchB had some changes to their VLANs. What is the cause?

  1. SwitchC should be set to transparent, not server.

  2. SwitchA should be set to client, not server.

  3. The revision on SwitchA needs to be increased.

  4. SwitchC should be running VTP version 3.

  5. The revision on SwitchC was higher than on the other switches.

image from book
Figure 6-9

image from book

37. 

When troubleshooting an ISDN problem, which of the following is a valid test of layer 1?

  1. Ping of the remote host is successful

  2. Telnet to the remote host is successful

  3. Dial session to the remote host is successful

  4. Line is up

  5. Routing updates are working

c explanation: c. a successful dial session up is layer 1.

38. 

When troubleshooting an ISDN problem, which of the following is a valid test of layer 2?

  1. Ping of the remote host is successful

  2. Telnet to the remote host is successful

  3. Dial session to the remote host is successful

  4. Line is up

  5. Routing updates are working

d explanation: d. the line is up is a valid layer 2 test.

39. 

When troubleshooting an ISDN problem, which of the following is a valid test of layer 3?

  1. Ping of the remote host is successful

  2. Telnet to the remote host is successful

  3. Dial session to the remote host is successful

  4. Line is up

  5. Routing updates are working

image from book

40. 

After configuring a router, you issue a copy running-config startup-config command and then issue a reload command. After rebooting, the router comes up without a configuration. Which of the following is the most likely cause of this?

  1. A faulty router.

  2. You should have used copy startup-config running-config before the reload.

  3. An incorrect configuration register setting.

  4. User error.

image from book

41. 

Look at the following diagram. Which of the switchports can be safely configured with portfast enabled?

  1. Fa1/1

  2. Fa1/2

  3. Fa1/20

  4. All of the above

  5. None of the ports

image from book
Figure 6-10

image from book

42. 

What is the default encapsulation used on Cisco serial links?

  1. PPP

  2. IETF

  3. HDLC

  4. Frame Relay

image from book

43. 

With which network type will OSPF establish router adjacencies but not perform the DR/BDR election process?

  1. Point-to-point

  2. Backbone area 0

  3. Broadcast multiaccess

  4. Non-broadcast multiaccess

image from book

44. 

What is the default administrative distance of OSPF?

  1. 90

  2. 100

  3. 110

  4. 120

image from book

45. 

What will occur if two Cisco LAN switches are connected with a single crossover cable?

  1. The switch port link light will be off on both switches, indicating that the ports are not connected.

  2. The switch port link light will be off on one switch, indicating that STP has disabled the port.

  3. The switch port link lights will flash amber, indicating an error.

  4. The switch port link lights will be green, indicating normal operation.

image from book

46. 

Look at the following diagram. The network has been configured, but none of the hosts can communicate with either the Internet or each other. What is the problem?

  1. The router address on VLAN 2

  2. The host's address on VLAN 2

  3. The router address on VLAN 3

  4. The host's address on VLAN 3

  5. The ISL trunk link configuration

image from book
Figure 6-11

image from book

47. 

Which of the following IP addresses cannot be routed across the public Internet? (Choose two.)

  1. 127.0.0.1

  2. 204.11.17.6

  3. 172.36.2.3

  4. 192.168.78.13

  5. 1.0.0.0

image from book

48. 

Which wildcard mask specifies only the hosts from 192.168.34.33 through 192.168.34.62?

  1. 255.255.255.240

  2. 255.255.255.224

  3. 0.0.0.32

  4. 0.0.0.31

  5. None of the above

image from book

49. 

Which of the following commands will make viewing of passwords more difficult? (Choose two.)

  1. access-class

  2. enable secret

  3. enable password

  4. VTY password

  5. service password encryption

image from book

50. 

Which of the following commands will restrict access to telnet into the router? (Choose two.)

  1. access-class

  2. enable secret

  3. enable password

  4. VTY password

  5. service password encryption

image from book

51. 

What are the possible trunking modes for a switchport? (Choose three.)

  1. access

  2. on

  3. desirable

  4. dot1q

  5. auto

  6. ISL

image from book

52. 

You have two routers connected with a serial link. The local router is using the default encapsulation, and the remote router is using PPP encapsulation. The serial interface output on the local router shows that the interface is up, but line protocol is down. What is the problem?

  1. CHAP is not configured correctly.

  2. Inverse ARP needs to be configured.

  3. The serial interface is shut down on the remote router.

  4. You need to change the local router encapsulation to PPP.

image from book

53. 

Which STP state sends and receives all data frames on the switchport?

  1. Blocking

  2. Listening

  3. Learning

  4. Forwarding

  5. Disabled

d explanation: d. the forwarding port sends and receives all data frames on the bridged port.

54. 

Which EIGRP table lists all possible backup routes?

  1. Topology table

  2. Routing table

  3. Neighbor table

  4. ARP cache

  5. Feasible successor

image from book

55. 

Which EIGRP table lists all possible routes?

  1. Topology table

  2. Routing table

  3. Neighbor table

  4. ARP cache

  5. Feasible successor

image from book

Answers

1. 

C

Explanation:

C. The "Message Of The Day" (motd) is an old Unix command that allows you to display a message when anyone connects to a router or switch device.

2. 

A

Explanation:

A. The last 4 bits of the third octet and all of the forth octet are selected. This corresponds to the subnet mask of 255.255.240.0.

3. 

B

Explanation:

B. The hostname of the router you are connecting to must be entered using the username command. The passwords entered at each router must be the same. The usernames and passwords are case sensitive.

4. 

B

Explanation:

B. When the RIP routing process is enabled on a Cisco router, parameters such as Process ID and autonomous system number are not supported. The command router rip cannot be used in conjunction with any additional keywords. The command network network-number enables the routing process to determine which of the router's interfaces will participate in the sending and receiving of routing updates. RIP is a classful routing protocol; network numbers specified must be classful. Neither subnet numbers nor interface addresses are supported when configuring RIP.

5. 

A, C, D

Explanation:

A, C, D. Routers can limit the scope of broadcast storms, create smaller inter-connected networks, and filter by logical (IP) addresses. Routers do not typically reduce downtime.

6. 

D

Explanation:

D. In this case, the static route is valid, and connectivity will remain established.

7. 

B

Explanation:

B. Switches are bridges with higher port density. They do not stop broadcast storms; they actually cause them, when improperly configured - note that "when improperly configured" means that the spanning tree protocol is disabled. Wire speed means with almost no latency, or delay.

8. 

B

Explanation:

B. Inverse ARP maps a known IP address to a local DLCI.

9. 

C

Explanation:

C. Although several routing protocols will meet the need, static routing minimizes router CPU and WAN utilization.

10. 

B

Explanation:

B. Frame Relay will allow the speed; BRI will not. Point-to-point links are cost prohibitive in a fully meshed environment.

11. 

D

Explanation:

D. In this case, the wildcard bits are all host bits, which in a /24 network are the last 8 bits, or the last octet.

12. 

E

Explanation:

E. In this case, static routing will provide the simplest configuration. BGP would be useful if the Internet connectivity were more complex (multiple ISPs, for example).

13. 

C

Explanation:

C. There are five different STP port states, and all ports on a switch are in blocking mode when the switch is powered up or a device is plugged into a port. After STP convergence, all ports are in either a blocking or forwarding state.

14. 

D

Explanation:

D. When a device needs to resolve a logical IP address to a physical Ethernet address (MAC), it uses the Address Resolution Protocol (ARP).

15. 

D

Explanation:

D. In this case, the 192.168.1.0/26 subnet is the first subnet in the 192.168.1.0 Class C network, and you must have subnet zero enabled to use the first and last subnets.

16. 

B

Explanation:

B. Switches running Spanning-Tree Protocol exchange Bridge Protocol Data Units (BPDUs) every two seconds. BPDUs carry bridge ID information that includes the MAC address and bridge priority of the source device.

17. 

C, D

Explanation:

C, D. The route to 192.168.50.0 is unreachable, and only interfaces s0/1 and FastEthernet 0/0 are participating in the RIP update. Because a route update was received, at least two routers are participating in the RIP routing process. 192.168.50.0 is inaccessible (16 hops), and network 192.168.40.2 has been received correctly with a metric of 1 (1 hop).

18. 

B

Explanation:

B. Switch A is not a valid priority number. 4096 is the lowest priority. Switch B then has the lowest "valid" priority number.

19. 

C

Explanation:

C. The protocol is TCP, the wildcard mask for a /24 network is 0.0.0.255, and the port for web traffic is 80.

20. 

A

Explanation:

A. If you see that the line is up but the protocol is down, you are having a clocking (keepalive) or framing issue. Check the keepalives on both ends to make sure they match; that the clock rate is set, if needed; and that the encapsulation type is the same on both ends.

21. 

C

Explanation:

C. Only a router can route between two VLANs. A switch may support two separate VLANs, but a layer-3 device is required for two separate VLANs to communicate.

22. 

B

Explanation:

B. Default routes are created by using all zeros in place of the destination network and subnet mask.

23. 

C

Explanation:

C. In this case, the subnet is .20, the hosts are .21 and .22, and the broadcast address is .23.

24. 

A, C

Explanation:

A, C. The Hello protocol provides dynamic neighbor discovery and maintains the neighbor relationship.

25. 

C

Explanation:

C. You cannot telnet into a Cisco router by default. You must set the VTY password or use the no login command under the VTY lines.

26. 

A, C

Explanation:

A, C. Because CDP verifies layer-2 connectivity and framing, any issues at layer 1 or 2 can cause CDP to fail.

27. 

D

Explanation:

D. The router will look at each route to a network and first check the administrative distance (AD) of each available route. The one with the lowest AD will be used. Static routes have an AD of 1 by default, so they will be used over the routing protocols, which all have higher ADs.

28. 

C

Explanation:

C. The Frame Relay map command tells the router which DLCI to use at layer 2, based on the destination IP address.

29. 

D

Explanation:

D. A standard IP access list can only deny traffic based on source IP address. To filter traffic based on a specific protocol, an extended access list must be used.

30. 

D

Explanation:

D. IP address 184.26.29.78 is a Class B address that has been subnetted using an additional 4 bits of mask. The network address for this IP address is 184.26.16.0.

31. 

B

Explanation:

B. All Cisco routers have a 16-bit software register that enables the router to select a variety of configuration options during boot. The configuration register is displayed in hexadecimal format. Each group of 4 bits (beginning with bit 15 and ending with bit 0) represents one hexadecimal digit. The factory-default configuration register for a Cisco router is 0x2102.

32. 

D

Explanation:

D. When a switch is first powered on, all ports are placed in the blocking state to prevent bridge loops. As ports transition from the blocked state to the listening state, they begin detecting incoming frames. As a port transitions to the learning state, it processes information contained in BPDU updates and executes the spanning-tree algorithm (STA) to calculate a loop-free topology. The STA ensures that ports on the switch are either set in the forwarding state or returned to the blocking state.

33. 

D

Explanation:

D. This is known as a default route. It becomes relevant only if the destination network for a packet is not known by some other means. In that case, it will forward the packet out interface serial1.

34. 

B, D, E

Explanation:

B, D, E. In order for your network to send subnet mask information with the route updates, you must use a classless routing protocol like RIPv2, EIGRP, or OSPF.

35. 

D

Explanation:

D. The host on VLAN 3 has an IP address assigned that belongs to VLAN 2.

36. 

E

Explanation:

E. The VTP server with the highest revision number will overwrite the VLAN database of all switches with a lower revision number.

37. 

C

Explanation:

C. A successful dial session up is layer 1.

38. 

D

Explanation:

D. The line is up is a valid layer 2 test.

39. 

A

Explanation:

A. Ping is a valid test of layer 3. Telnet and routing use additional protocols on top of layer 3.

40. 

C

Explanation:

C. If the configuration register is incorrectly set, the router can ignore the startup-config on reload and boot without any configuration.

41. 

C

Explanation:

C. Portfast should not be used between switches; it should be used only when hosts are connected to the switch.

42. 

C

Explanation:

C. Cisco's default encapsulation for serial links is HDLC. To use a different encapsulation, you use the encapsulation command at the interface level.

43. 

A

Explanation:

A. On point-to-point and point-to-multipoint networks, OSPF will not perform DR/BDR elections.

44. 

C

Explanation:

C. OSPF has a default administrative distance of 110. EIGRP is 90, and RIP (both v1 and v2) is 120.

45. 

D

Explanation:

D. To connect two switches, you need a crossover cable. When a link is working on a switch, the port link light is green, not amber.

46. 

E

Explanation:

E. The switch is a Cisco 2950, which does not support ISL trunking. It only supports IEEE 802.1q trunking.

47. 

A, D

Explanation:

A, D. 127.0.0.0 is reserved and not routable. 192.168.78.13 is considered private address space and thus not routable.

48. 

D

Explanation:

D. The subnet mask is 255.255.255.224 here, so you want the last 5 bits in the last octet to be wildcards. This gives 0.0.0.31.

49. 

B, E

Explanation:

B, E. Both B and E will encrypt the enable password. E will encrypt other passwords in the configuration as well.

50. 

A, D

Explanation:

A, D An access-class allows you to limit which source IP addresses have access to the router. The VTY password requires a password for access.

51. 

B, C, E

Explanation:

B, C, E. Three switchport trunking modes are on, desirable, and auto. Dot1q and ISL are not modes; they are trunking protocols. Access is not a trunking mode; it is a separate mode.

52. 

D

Explanation:

D. By default, the encapsulation on serial links is HDLC and is proprietary to each vendor. Serial links will not come up if the encapsulations do not match.

53. 

D

Explanation:

D. The forwarding port sends and receives all data frames on the bridged port.

54. 

E

Explanation:

E. Feasible successors are routes that can be surfaced to the routing table, should a primary route become unavailable.

55. 

A

Explanation:

A. All possible routes are stored in the topology table. Only the best route is surfaced to the routing table.



Cliffs TestPrep. Cisco CCNA
CliffsTestPrep Cisco CCNA
ISBN: 0470117524
EAN: 2147483647
Year: 2004
Pages: 21
Authors: Todd Lammle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net