CCNA-Practice Test 8


Directions: For each of the following questions, select the choice that best answers the question or completes the statement.

1. 

What protocol sends redirects to an originating router?

  1. TCP

  2. IP

  3. ICMP

  4. UDP

image from book

2. 

What command shows you the IP address of your neighbor device?

  1. show cdp

  2. cdp enable

  3. show cdp neighbors detail

  4. show cdp timers

image from book

3. 

Look at the following diagram. You have installed the two switches SW-Seattle1 and SW-Seattle2. When you issue the show cdp neighbor command on them, you note that neither switch can see the other one. Which of the following is the most likely cause?

  1. A problem with VTP

  2. A problem with cabling

  3. A problem with trunk configuration

  4. A problem with the IP addresses on the switches

image from book
Figure 8-1

image from book

4. 

Which of the following will correctly add a default route to a router?

  1. ip route any any e0

  2. ip route 0.0.0.0
    255.255.255.255 e0

  3. ip route default e0

  4. ip route 0.0.0.0 0.0.0.0 e0

image from book

5. 

How is a bridge ID assigned?

  1. It is assigned by the administrator who sets the MAC address.

  2. It is assigned the highest IP address and priority.

  3. It is assigned using the priority and the MAC address.

  4. Bridge IDs are not assigned.

c explanation: c. the priority and the mac address are combined to build the bridge id.

6. 

What does the config mem command do?

  1. Configures the router using the running-config contents

  2. Configures the router using the startup-config contents

  3. Configures the router using the contents of a file from a TFTP server

  4. None of the above

image from book

7. 

Look at the following diagram. You have configured the network as shown, yet it has failed to converge. Which of the following is the likely reason?

  1. You need to configure default routes on the two routers.

  2. The EIGRP AS numbers need to be added.

  3. The EIGRP network statements are incorrect.

  4. You need to add the no auto-summary command to EIGRP.

image from book
Figure 8-2

image from book

8. 

You have been asked to recommend a WAN service for a small rural network. It has 11 offices and needs fully meshed connectivity and at least 768Kbps of throughput. Which of the following is the best option?

  1. HDLC

  2. PPP

  3. Frame Relay

  4. Point-to-point links

  5. ISDN

image from book

9. 

What does the config net command do?

  1. Configures the router using the running-config contents

  2. Configures the router using the startup-config contents

  3. Configures the router using the contents of a file from a TFTP server

  4. None of the above

image from book

10. 

What are the valid hosts for the subnet on which the address 172.16.4.14 255.255.252.0 resides?

  1. 5.1 to 7.1

  2. 4.1 to 8.254

  3. 4.1 to 4.255

  4. 4.1 to 7.254

image from book

11. 

Look at the following diagram. Suppose you have been given the 192.168.74.0/24 network to use at this site. You need to create subnets for each of the three VLANs. Assuming that you have VLSM available, what is the largest number of host addresses you can have?

  1. 128

  2. 186

  3. 250

  4. 256

image from book
Figure 8-3

image from book

12. 

Look at the following diagram. Suppose you have been given the 192.168.74.0/24 network to use at this site. You need to create subnets for each of the three VLANs. In this case, you cannot use VLSM. What is the largest number of host addresses you can have?

  1. 128

  2. 186

  3. 250

  4. 256

image from book
Figure 8-3

image from book

13. 

What is wrong with the following command?

 access-list 10 permit tcp     any any eq     23 

  1. It is an extended access list that does not check the source and destination addresses.

  2. It is a standard access list that does not check the source and destination addresses.

  3. It is a standard access list attempting to check TCP ports.

  4. Nothing; it will work as written.

image from book

14. 

Which of the following pieces of information will you not find in a routing table?

  1. Route metrics

  2. Default network

  3. Default gateway

  4. Directly connected active networks

image from book

15. 

Look at the following diagram. You have been asked to troubleshoot a network problem. What is the most likely cause of network connectivity issues here?

  1. Host A configuration

  2. Host B configuration

  3. Int E0 configuration

  4. Int E1 configuration

image from book
Figure 8-4

image from book

16. 

What will stop network loops from occurring in distance-vector networks in which a downed link is set to infinity?

  1. RTMP

  2. Poisoned updates

  3. Route poisoning

  4. Poison reverse

image from book

17. 

Which one of the following are valid ways for a switch to learn a MAC address?

  1. Static configuration

  2. Dynamic learning

  3. VTP

  4. STP

image from book

18. 

The following commands have been added to a router to allow it to communicate with an existing OSPF network, but it is not working. What is the likely cause?

         Router ospf 10         Network 172.16.0.0               255.255.0.0               area 0 

  1. The OSPF AS number is incorrect.

  2. The network address is incorrect.

  3. The network mask is incorrect.

  4. The area ID is incorrect.

c explanation: c. the mask is incorrect here; it should be 0.0.255.255.

19. 

Which of the following can you use to segment a LAN? (Choose three.)

  1. Hub

  2. Bridge

  3. Switch

  4. Router

image from book

20. 

Consider the following entry from a routing table. What does the 110 stand for?

         O  10.0.0.0/8  [110/20]               via            192.168.10.1, 00:06:37,               Ethernet               0 

  1. The administrative distance

  2. The distance metric

  3. The OSPF area

  4. OSPF

  5. EIGRP

a explanation: a. the 110 is the administrative distance for this route.

21. 

Consider the following entry from a routing table. What does the 20 stand for?

         O  10.0.0.0/8  [110/20]            via            192.168.10.1, 00:06:37,            Ethernet            0 

  1. The administrative distance

  2. The distance metric

  3. The OSPF area

  4. OSPF

  5. EIGRP

b explanation: b. the 20 is the distance metric for this route.

22. 

Which of the following protocols provides logical addressing and routing through an internetwork?

  1. IP

  2. ARP

  3. BootP

  4. ICMP

  5. TCP

image from book

23. 

Where are EIGRP successor routes stored?

  1. In the routing table only

  2. In the neighbor table only

  3. In the topology table only

  4. In the routing table and the neighbor table

  5. In the topology table and the routing table

image from book

24. 

You have a single registered Class C address that you must use to address an internetwork. You cannot use NAT, but you can use VLSM. What is the most efficient choice to use for point-to-point serial links?

  1. /24

  2. /28

  3. /29

  4. /30

  5. /31

image from book

25. 

Which of the following subnet masks corresponds with a /18 network?

  1. 255.255.255.0

  2. 255.255.192.0

  3. 255.255.255.128

  4. 255.255.224.0

  5. 255.255.0.0

image from book

26. 

Which of the following wildcard masks corresponds with a /18 network?

  1. 0.0.192.255

  2. 0.0.63.255

  3. 0.0.128.255

  4. 0.0.17.255

  5. 0.0.0.255

image from book

27. 

Look at the following diagram. You have a router with routing configured as illustrated. Suppose a packet destined for 10.0.23.253 enters the router. Which interface will the router send it out?

  1. E0

  2. E1

  3. E2

  4. S0

image from book
Figure 8-5

image from book

28. 

Which of the following routing protocols combines characteristics of both the distance-vector and link-state routing protocols?

  1. RTMP

  2. NLSP

  3. EIGRP

  4. NLSP

image from book

29. 

Which of the following commands allows you to support discontiguous networking with RIPv2 and EIGRP?

  1. ip subnet-zero

  2. cut-through

  3. VLSM continue

  4. no auto-summary

  5. auto-summary

  6. auto-contiguous

image from book

30. 

What is the last available host address for the IP subnet on which 172.20.7.150 255.255.255.192 resides?

  1. 172.20.7.255

  2. 172.20.7.190

  3. 172.20.7.191

  4. 172.20.7.129

  5. 172.20.255.255

image from book

31. 

Look at the following diagram. You have a router with routing configured as illustrated. Suppose a packet destined for 10.0.12.157 enters the router. Which interface will the router send it out?

  1. E0

  2. E1

  3. E2

  4. S0

image from book
Figure 8-5

image from book

32. 

What is the host range of the subnet in which the following IP address resides?

 172.16.10.33 255.255.255.224 

  1. 172.16.10.32 - 10.63

  2. 172.16.10.33 - 10.63

  3. 172.16.10.32 - 10.64

  4. 172.16.10.33 - 10.62

image from book

33. 

What does EIGRP use to find redundant paths in the internetwork?

  1. Hop count

  2. OSPF

  3. DUAL

  4. Bandwidth and delay of the line

image from book

34. 

Look at the following diagram. Suppose you are asked to configure the switch with an IEEE standard trunk link to the router. Which of the following commands should you use? (Choose three.)

  1. interface fastethernet 1/1

  2. switchport mode access

  3. portfast

  4. switchport mode trunk

  5. switchport mode dot1q

  6. switchport trunk encapsulation
    dot1q

image from book
Figure 8-6

image from book

35. 

Where would a router boot from if a configuration register was set to 0x0101?

  1. Flash

  2. ROM

  3. Boot ROM

  4. NVRAM

image from book

36. 

Which of the following are spanning-tree port states? (Choose three.)

  1. Learning

  2. Spanning

  3. Listening

  4. Forwarding

  5. Filtering

image from book

37. 

Suppose a route has an administrative distance of 0. What does this mean?

  1. It is a static route.

  2. The route is directly connected.

  3. This route is not in the routing table but is in the topology database.

  4. There are 0 hops to the next destination.

image from book

38. 

Which of the following is a valid IP extended access list?

  1.  access-list 110 permit ip any host 1.1.1.1 eq ftp 

  2.  access-list 10 permit tcp ip any any eq 21 

  3.  access-list 99 permit udp any host 2.2.2.2 eq ip 

  4.  access-list 199 permit tcp any 0.0.0.0 255.255.255.255 eq 21 

image from book

39. 

Which of the following cables should you use to attach a PC COM port to a router to configure it?

  1. Straight-through

  2. Crossover

  3. Rollover

  4. Null modem

image from book

40. 

What is the default administrative distance of RIP?

  1. 1

  2. 100

  3. 120

  4. 150

c explanation: c. routing information protocol (rip) has an ad of 120 by default.

41. 

You have a Cisco router and a non-Cisco router connected through a point-to-point serial link. Both routers are configured for HDLC encapsulation, yet they are not able to communicate. What is the likely problem?

  1. Cisco is proprietary, and you must have two Cisco routers.

  2. You are using a proprietary HDLC encapsulation.

  3. You are using the PPP encapsulation.

  4. It does work by default.

image from book

42. 

Look at the following diagram. Which one of the following are possible properties of the link between the two switches, assuming that it is configured correctly?

  1. Portfast enabled

  2. Trunk link

  3. Sraight-through cable

  4. Crossover cable

image from book
Figure 8-7

image from book

43. 

Look at the following diagram. You have a router with routing configured as illustrated. Suppose a packet destined for 192.168.3.171 enters the router. Which interface will the router send it out?

  1. E0

  2. E1

  3. E2

  4. S0

image from book
Figure 8-5

c explanation: c. this host is connected on interface e2.

44. 

What is the purpose of the Spanning Tree Protocol?

  1. Creates link-state routing tables

  2. Stops switched loops in bridged networks

  3. Works with LSA to create a route table

  4. Stops electromagnetic Ethernet storms

image from book

45. 

Which of the following statements regarding EIGRP successor routes are valid? (Choose two.)

  1. A successor route is used by EIGRP to forward traffic to a destination.

  2. Successor routes are saved in the topology table to be used if the primary route fails.

  3. Successor routes are flagged as active in the routing table.

  4. A successor route may be backed up by a feasible successor route.

  5. Successor routes are stored in the neighbor table following the discovery process.

image from book

46. 

Which type of Ethernet cable is used to connect a router to an Ethernet switch?

  1. Rolled

  2. Crossover

  3. Straight-through

  4. Fooled

image from book

47. 

Look at the following diagram. Suppose you wish to permit hosts at LA and Chicago to access web sites on the Internet, but not hosts in Miami. Also, you do not want anyone not in Miami to access web sites hosted in Miami. Which of the following lines might you use in an ACL to complete this, assuming the last line of the access list is access-list 110 permit ip any any?

  1.  access-list 110 deny tcp 192.168.0.0 0.0.0.255 any eq 80 

  2.  access-list 110 permit tcp 192.168.0.0 0.0.0.255 any eq 80 

  3.  access-list 110 deny tcp any 192.168.0.0 0.0.0.255 eq 80 

  4.  access-list 110 permit tcp any 192.168.0.0 0.0.0.255 eq 80 

image from book
Figure 8-8

image from book

48. 

Which of the following is a valid standard IP access-list command?

  1. access-list 110 permit
    172.16.0.0 0.0.255.255

  2. access-list 10 permit ip any

  3. access-list 10 deny any any eq
    ftp log

  4. access list 100 permit ip any
    any

image from book

49. 

Which of the following are benefits of designing OSPF in a hierarchical fashion? (Choose three.)

  1. Decreases routing overhead

  2. Speeds up convergence

  3. Confines network instability to single areas of the network

  4. Makes configuring OSPF easier

image from book

50. 

Which of the following layers of the OSI model is responsible for converting data to segments?

  1. Application

  2. Presentation

  3. Session

  4. Transport

image from book

51. 

Where is a successor route stored? (Choose two.)

  1. In the topology table

  2. In the neighbor table

  3. In the routing table

  4. In the ARP cache

image from book

52. 

Look at the following diagram. Suppose you do not want anyone not in Miami to access web sites hosted in Miami. You have created the following access list; where should you best apply it and in what direction?

         access-list 110 deny tcp               any 192.168.0.0               0.0.0.255 eq 80         access-list 110 permit ip               any any 

  1. LA and Chicago, outbound on a serial interface

  2. LA and Chicago, inbound on a serial interface

  3. Miami, outbound on a serial interface

  4. Miami, inbound on a serial interface

image from book
Figure 8-8

d explanation: d. although a would work, d is the best place for an access list of this type.

53. 

Which of the following will be the RID of a router?

  1. The lowest IP address of an interface

  2. The highest IP address of an interface

  3. The lowest IP address of a logical interface

  4. The highest IP address of a logical interface

image from book

54. 

Which statement is true regarding what VTP transparent mode accomplishes?

  1. Transparent mode only forwards messages and advertisements; it does not add them to their own database.

  2. Transparent mode both forwards messages and advertisements and adds them to their own database.

  3. Transparent mode does not forward messages and advertisements.

  4. Transparent mode makes a switch dynamically secure.

image from book

55. 

What command should follow this command?

         access-list 110 deny tcp           any host           1.1.1.1 eq ftp 

  1.  access-list 110 deny host 1.1.1.1 any eq ftp 

  2.  access-list 110 permit any any ip 255.255.255.255 ftp 

  3.  access-list 110 permit ip any 0.0.0.0 255.255.255.255 

  4. None; it is fine as is.

image from book

Answers

1. 

C

Explanation:

C. Internet Control Message Protocol (ICMP) redirect messages are used by routers to notify the hosts on the data link that a better route is available for a particular destination.

2. 

C

Explanation:

C. The show CDP neighbors detail command gives you detailed information concerning neighboring devices.

3. 

B

Explanation:

B. In this case, the most likely cause is a cabling problem. Not seeing a CDP neighbor usually indicates a layer 1 or 2 problem (like not using a crossover cable between two switches).

4. 

D

Explanation:

D. The correct syntax for a default route is to create a static route with the destination network and mask as all zeros.

5. 

C

Explanation:

C. The priority and the MAC address are combined to build the bridge ID.

6. 

B

Explanation:

B. The config command can use the keyword terminal (t), memory (mem), or network (net). The difference is where the information originates (terminal from RAM, memory from NVRAM, and network from a TFTP server).

7. 

D

Explanation:

D. The 172.16.0.0 Class B network has been correctly subnetted, and the subnets are used on discontiguous networks. In this case, the automatic summarization must be disabled.

8. 

C

Explanation:

C. HDLC and PPP are encapsulations, not WAN technologies per se. P2P and ISDN links would be cost-prohibitive in a fully meshed topology. Because Frame Relay can provide multiple PVCs on a single physical link, it is the best recommendation.

9. 

C

Explanation:

C. The config command can use the keyword terminal (t), memory (mem), or network (net). The difference is where the information originates (terminal from RAM, memory from NVRAM, and network from a TFTP server).

10. 

D

Explanation:

D. The Class B subnet mask of 255.255.252.0 gives you 64 subnets, each with 1,022 hosts. The host specified in the question is in the second subnet: 256 - 252 4. The valid hosts for the 4.0 subnet are the numbers between the subnets, or 4.1 to 7.254. The broadcast address for the 4.0 subnet is 7.255.

11. 

C

Explanation:

C. With VLSM, you can create one /25 subnet and two /26 subnets. The /25 subnet yields 126 hosts, and each /26 subnet yields 62 hosts.

12. 

B

Explanation:

B. Because you cannot use VLSM, you must create three /26 subnets. Each /26 subnet yields 62 hosts.

13. 

C

Explanation:

C. This access list is a standard access list (number values 1 through 99). Standard access lists can check only the source address.

14. 

C

Explanation:

C. The purpose of a default gateway is to provide an access point that is external to the Cisco router and capable of routing packets destined for remote networks. The command ip default-gateway is used when the router is not routing IP.

15. 

A

Explanation:

A. Host A has a subnet mask of 255.255.255.224 applied to a /26 network. The correct mask would be 255.255.255.192 for a /26. If you answered C, you were close; but if you changed the configuration of E0 to /27, you would still need to change either the IP address or the default gateway on Host A, because with a /27 mask those two addresses would be in separate subnets.

16. 

C

Explanation:

C. The router that has the link fail sends a route poisoning, setting the metric to an unreachable level. In the case of RIP, the router sets the hop count to 16.

17. 

A, B

Explanation:

A, B. Switches can learn MAC addresses through either static configuration or dynamic learning. VTP carries VLAN information, not MAC addresses.

18. 

C

Explanation:

C. The mask is incorrect here; it should be 0.0.255.255.

19. 

B, C, D

Explanation:

B, C, D. Hubs do not segment the network but rather extend the distance a LAN can run. Bridge, switches, and routers are used to segment networks (although at different layers).

20. 

A

Explanation:

A. The 110 is the administrative distance for this route.

21. 

B

Explanation:

B. The 20 is the distance metric for this route.

22. 

A

Explanation:

A. Internet Protocol (IP) is a routed protocol that provides logical addressing and routing through an internetwork

23. 

E

Explanation:

E. The topology table keeps a list of every link in the network. The best links are placed in the routing table and are considered successor routes. Other links to the same remote networks are considered backup routes and called feasible successors.

24. 

D

Explanation:

D. The /30 subnet mask will give you two hosts per subnet, which is perfect for addressing serial links where only two addresses are required.

25. 

B

Explanation:

B. A /18network indicates that the first two octets, and the first two bits of the third octet, are part of the network address.

26. 

B

Explanation:

B. In a /18 network, the last six bits in the third octet, and all bits in the forth octet, are host bits. Setting these bits to ones (wildcard bits) yields the correct wildcard mask.

27. 

D

Explanation:

D. Because this IP address does not fall into any of the ranges specified by the static routes, it will follow the default route and be sent out S0.

28. 

C

Explanation:

C. Enhanced Interior Gateway Routing Protocol (EIGRP) is classified as a hybrid routing protocol. It uses distance-vector-based routing metrics to determine the best path to remote networks. It can converge faster than a traditional distance-vector routing protocol, however, because of the way it employs characteristics of link-state routing protocols. EIGRP maintains a topology table of the network and sends topology change updates when topology changes occur.

29. 

D

Explanation:

D. To allow the use of discontiguous networks, you need to supply the command no auto-summary under the routing protocol configuration on the classful-network boundary router.

30. 

B

Explanation:

B. The subnet mask is 255.255.255.192, so the block size is 64. Based on that block size, the network addresses are 172.20.7.64 and 172.20.7.128. This device is on the 128 network, and that network has a broadcast of 191, so the last host is 190.

31. 

A

Explanation:

A. The static route to 10.0.0.0 0.0.15.255 includes this host. The target IP address is connected on interface E0.

32. 

D

Explanation:

D. The network block size is 256 minus 224, or 32; therefore, the networks start every 32 addresses. The first network is 172.16.10.0, the second is 172.16.10.32, the third is 172.16.10.64, and so on. This host is on the 172.16.10.32 network, and the range is .33 through .62 with the broadcast at .63.

33. 

C

Explanation:

C. You probably chose D, bandwidth and delay of the line, but that option is incorrect. To find redundant paths, EIGRP uses Diffusing Update Algorithm (DUAL). Bandwidth and delay of the line are used to find the best path to a route after DUAL finds all the paths.

34. 

A, D, F

Explanation:

A, D, F. A will be used to select the appropriate interface; you must then specify the mode as trunk and the encapsulation as dot1q (the IEEE standard; ISL is Cisco proprietary).

35. 

B

Explanation:

B. The configuration register is used to tell the router how to load the IOS and configuration. The value 0x0101 tells the router to boot from ROM.

36. 

A, C, D

Explanation:

A, C, D. The five port states are blocking, listening, learning, forwarding, and disabled.

37. 

B

Explanation:

B. Directly connected networks have the highest administrative distance, or trustworthiness rating, which is 0.

38. 

D

Explanation:

D. Extended access lists use the numbers 100 through 199, which eliminates options B and C. To filter on an upper-layer protocol, you must use UDP or TCP in the protocol field, so option A is wrong.

39. 

C

Explanation:

C. A rollover cable is used to attach to the console port of a router to configure it.

40. 

C

Explanation:

C. Routing Information Protocol (RIP) has an AD of 120 by default.

41. 

B

Explanation:

B. Cisco routers run a proprietary High-Level Data Link Control (HDLC) encapsulation on all serial links by default. To get a Cisco router to connect to a non-Cisco router, you need to change that encapsulation to PPP.

42. 

B, D

Explanation:

B, D. Portfast should not be enabled between switches, only between hosts and switches. The link could be a trunk link if it is carrying multiple VLANs. A crossover cable is used to connect two switches.

43. 

C

Explanation:

C. This host is connected on interface E2.

44. 

B

Explanation:

B. Bridges use the spanning-tree algorithm, enabling a learning bridge to dynamically work around loops in a network topology by creating a spanning tree.

45. 

A, D

Explanation:

A, D. Successor routes are routes that are considered the best route (think successful!). Feasible successor routes are backup routes stored in the topology table.

46. 

C

Explanation:

C. A straight-through Ethernet cable is used to connect a host or router to a switch.

47. 

A, C

Explanation:

A, C. A will block access from hosts on the Miami subnet to external web sites, and C will block anyone, regardless of source, from accessing web sites in Miami.

48. 

B

Explanation:

B. Options A and D use access-list numbers that are reserved for extended IP access lists. Option C filters by protocol, which a standard IP access list cannot do.

49. 

A, B, C

Explanation:

A, B, C. OSPF hierarchical design, if done correctly, can help decrease routing protocol overhead as well as speed up convergence time of the network. If a problem occurs, the whole network isn't flooded with information; only routers within the troublesome area are affected. However, a multi-area design is a much more difficult configuration.

50. 

D

Explanation:

D. The Transport layer of the OSI model receives raw data from the Session layer to create segments. The Transport layer divides the data stream into units and encapsulates the information with Transport layer header-specific information.

51. 

A, B

Explanation:

A, B. The successor routes are stored in both the topology table and the neighbor table. Feasible successors are stored in the topology table and are considered backup routes.

52. 

D

Explanation:

D. Although A would work, D is the best place for an access list of this type.

53. 

D

Explanation:

D. By default, the highest IP address of any active interface at the moment of OSPF startup is the RID of the router. However, if a logical interface is configured, then the IP address of the logical interface is the RID of the router.

54. 

A

Explanation:

A. The transparent switch is a stand-alone switch that can be connected to your network for management. It does not add VLAN information to its VLAN database, nor does it share its configured VLAN information. It passes VLAN information received from one trunked port out a different trunked port if configured.

55. 

C

Explanation:

C. You cannot create a deny list without at least one permit. The command access-list 110 permit ip any any (0.0.0.0 255.255.255.255 is the same as the any command) is a wildcard that permits everything not eliminated from a deny test statement.



Cliffs TestPrep. Cisco CCNA
CliffsTestPrep Cisco CCNA
ISBN: 0470117524
EAN: 2147483647
Year: 2004
Pages: 21
Authors: Todd Lammle

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net