ccna sample questions

15
Question 1 You want to verify the configuration register entry of a Cisco 2500 series router. What command should you use on the router? a. show config-reg b. show version c. show register d. show running-config e. show bootflash f. show flash Question 2 Users on a network subnet experience slow connectivity when trying to access file servers located on another LAN segment. There are more than 200 users on the subnet. A Cisco 2500 router serves as the default gateway as well as the firewall for the subnet. You suspect the problem could be caused by excessive CPU utilization on the router. What command will verify that this is the case? a. show cpu b. show cpu utilization c. show cpu processes d. show hardware

Upload: will-yang

Post on 26-Mar-2015

220 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: CCNA Sample Questions

Question 1

You want to verify the configuration register entry of a Cisco 2500 series router. What command should you use on the router?

a. show config-reg

b. show version

c. show register

d. show running-config

e. show bootflash

f. show flash

Question 2

Users on a network subnet experience slow connectivity when trying to access file servers located on another LAN segment. There are more than 200 users on the subnet. A Cisco 2500 router serves as the default gateway as well as the firewall for the subnet. You suspect the problem could be caused by excessive CPU utilization on the router.

What command will verify that this is the case?

a. show cpu

b. show cpu utilization

c. show cpu processes

d. show hardware

e. show processes cpu

Page 2: CCNA Sample Questions

Question 3

Which four of the following must you know about configuring passwords on a Cisco router?

a. It is possible to configure all line access passwords during setup configuration mode.

b. All passwords can be encrypted.

c. Each line access port can be assigned a password.

d. Local database can be used for password authentication.

e. External Radius or TACACS servers can be used for password authentication.

f. Only privileged configuration mode can be assigned a password.

Question 4

Which three of the following information is gathered by the Cisco Discovery Protocol?

a. Hardware platform.

b. All addresses of each layer 3 protocol.

c. Only one address of each layer 3 protocol.

d. Routing table.

e. Routing protocol .

f. Device ID.

Question 5

It was a Saturday morning. You had just been waked up by a pager call about a connectivity problem between a branch router and the head office router. Both routers are connected via a leased line. The link needs to be up 24-hour a day because it carries important financial transactions.

You began your troubleshooting by trying to connect to the branch router using telnet but failed. Fortunately, you managed to connect to a dial up modem attached to the branch router. You did a 'show interface' command on the router. The result is shown below:

Branch#show interface serial 0/0

Serial0/0 is down, line protocol is down

  Hardware is HD64570

Page 3: CCNA Sample Questions

  Internet address is 192.168.10.2/30

  MTU 1500 bytes, BW 1544 Kbit, DLY 20000 usec, rely 255/255, load 1/255

  Encapsulation HDLC, loopback not set, keepalive set (10 sec)

  Last input never, output 00:03:11, output hang never

  Last clearing of "show interface" counters never

  Input queue: 0/75/0 (size/max(drops): Total output drops: 0

  Queuing strategy: weighted fair

  Output queue: 0/1000/64/0 (size/max active/threshold/drops)

  Conversations 0/2/256 (active/max active/max total)

  Reserved Conversations 0/0 (allocated/max allocated)

  5 minute input rate 0 bits/sec, 0 packets/sec

  5 minute output rate 0 bits/sec, 0 packets/sec

     0 packets input, 0 bytes, 0 no buffer

     Received 0 broadcasts, 0 runts, 0 giants, 0 throttles

     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort

     11 packets output, 476 bytes, 0 underruns

     0 output errors, 0 collisions, 27 interface resets

     0 output buffer failures, 0 output buffers swapped out

     11 carrier transitions

     DCD=down DSR=down DTR=down RTS=down CTS=down

Based on the output of the 'show interface serial 0/0' command issued on the branch router, which OSI layer is most likely causing the problem?

a.        Transport layer

b.       Session layer

c.       Data layer

d.       Physical layer

e.       Network layer

Page 4: CCNA Sample Questions

Question 6

Geoff is a network administrator of a small network consists of three Cisco 2600 routers interconnected by a frame relay cloud. One day, he wants to add a static route to one of the remote router. He connects to the router using telnet from his workstation. Which layer of the OSI protocol stack is Geoff using for this task?

a. Application

b. Presentation

c. Session

d. Transport

e. Network

f. Data-link

Question 7

From the seven OSI layers, which layer is responsible for error recovery and reliability?

a. Presentation

b. Session

c. Application

d. Transport

e. Network

f.  Data-link

Question 8

You are a network consultant for Super LAN Interconnect, Inc. (SLII). One of your clients has a flat Ethernet network with 500 end-users and server farms. The network performance is poor from time to time.

The client hires your company to do analysis and redesign the current network infrastructure to improve performance. You recommend to segment the flat network into multiple segments. What is the benefit of your solution to solve the problem?

a. It will increase the number of collision domains.

b. It will decrease the broadcast domains.

Page 5: CCNA Sample Questions

c. Less total cost of ownership (TCO).

d. More users can be allocated within a single broadcast domain.

e. Smaller collision domains without the need of layer 3 routing.

Question 9

To understand the operation of bridges is essential to understand the operation of switches. Which three of the following characterize the correct operation of bridges and switches?

a. Bridges are inherently more robust and faster than switches.

b. Switches operate at data link layer while bridges operate at physical layer.

c. Both bridges and switches forward data link layer broadcasts.

d. Switches commonly have a higher port density compared to bridges.

e. Switches are mainly software based while bridges are hardware based.

f. Switches create collision domains while bridges define broadcast domains.

g. Both bridges and switches forward traffic based on layer 2 addresses.

Question 10

Acme Provisioning, Inc., a local IT integration provider, has just completed redesigning its campus LAN with VLAN segmentation. You, as the company's network administrator, have been tasked to connect 10 Windows XP Professional workstations to the access-layer switches (Catalyst 2900XL switches).

You verify that correct IP address, subnet mask, default gateway, and DNS servers have been configured on all PCs. You have also checked that correct Category 5 cabling are used for the connection. However, some workstations are experiencing problems connecting to other workstations on the same switch.

Which of the following is most likely cause of the problem?

a.        The access-layer switch does not propagate the host routing entries to the core layer switches.

b.       The switch ports on which the workstations are connected to are configured with incorrect VLAN.

c.       The workstations have been configured with invalid MAC addresses.

d.       Spanning-Tree Protocol (STP) has been disabled on those switch ports.

Page 6: CCNA Sample Questions

e.       The router that performs intra-VLAN routing does not have route entries for the workstations.

Question 11

A Catalyst 2950 switch runs multiple VLANs to serve different workgroups. You want to verify that VLAN 100 is working properly and execute the 'show spantree' command.

Which of the following line confirms the correct operation of VLAN 100?

a.        Port FastEthernet 0/1 of VLAN 1000 is forwarding.

b.       Root port is FastEthernet 0/24.

c.       VLAN 100 is executing ISL compatible spanning-tree protocol.

d.       Designated port is Ethernet 0/1, path cost 10.

e.       Designated root has priority 0, address 0080.35C 298 d.

Question 12

You want to extend VLAN from a Catalyst 500 switch to another switch of the same model and setup trunk connectivity between them. Which of the following VLAN frame tagging are available as a choice?

a. Inter-Switch Link (ISL)

b. 802.1Q

c. 802.1D

d. 802.3u

e. 802.10

f. LAN Emulation (LANE)

Question 13

You have just started as a junior network administrator for a local department store in your city. One of your first tasks is to provide LAN connectivity for end users. Which of the following Ethernet technology can operate in full-duplex mode? (Select three.)

a. 10Base2

b. 10Base5

Page 7: CCNA Sample Questions

c. 10BaseT

d. 100BaseT

e. 1000BaseT

Question 14

The 10BaseT Ethernet standard defines full-duplex mode as well as half-duplex mode. Which of the following are characteristic of full-duplex mode? (Choose three.)

a. Higher effective throughput

b. Private collision domain

c. Shared collision domain

d. Lower effective throughput

e. No collisions

f. Private broadcast domain

Question 15

Your LAN has undergone a redesign to accommodate new applications' bandwidth requirements. As the head of the project team, you must direct the team to come out with a sound yet economical recommendation.

The requirements are:

a.       There are one Windows 2000 Domain Controller and one SQL Server 2000 serves the needs of 35 local users.

b.       Each user needs to be able to collaborate between them and access the network servers at 10 Mbps bandwidth.

c.       Other department in your company will use not higher than 2.5 Mbps bandwidth from the network servers.

Which of the following best fulfills the above requirements?

a. Install two Catalyst 1900 switches and configure the servers to use 100 Mbps ports. Assign

dedicated 10 Mbps to the end-user ports.

b. Replace existing 10baseT hubs with 100BaseT hubs to improve overall performance

Page 8: CCNA Sample Questions

c. Separate the servers' network segment from the users through the use of a router. This segregation

will provide more bandwidth.

d. Put a bridge between the servers' network segment and the users.

e. Retain existing hubs but separate the network segments with multiple VLANs.

Question 16

When designing a switch internetwork, one important consideration is the physical cabling distance. What is the maximum allowable distance of the 100BaseTX standard?

a. 10 m

b. 50 m

c. 95 m

d. 100 m

e. 1000 m

Question 17

You are investigating a LAN congestion issue using a network sniffer. Several entries of address 175.36.78.255 appear in the capture result. What is the function of this address?

a. IP directed broadcast

b. IP multicast group

c. Reserved IP address

d. IPX SAP broadcast

e. IPX multicast address

Question 18

TCP/IP is the most used protocol in today networking world. Which three of the following statements about TCP/IP functionalities are correct?

a. IP is a connection-less service and responsible for path determination.

Page 9: CCNA Sample Questions

b. TCP provides dynamic throughput for large data transfer through windowing and connection-

oriented services.

c. RARP enables MAC address resolution from IP address.

d. ICMP provides control and error notification through connection-oriented messages.

e. UDP provides an efficient way of delivering information without additional overheads and

acknowledgments using connection-less services.

Question 19

What two Cisco IOS commands can be used to verify IP address existence in a network?

a. show

b. icmp

c. trace

d. arp

e. ping

f.  debug

Question 20

Which of the following IOS command displays all routed protocols configured on a Cisco router as well as the interfaces on which the protocols are enabled?

a.  show interfaces

b.  show protocols

c.  show routed protocols

d.  show interfaces protocol

e.  show protocol all

f.   show ip interface brief

Question 21

Page 10: CCNA Sample Questions

Fred is a network administrator of GoMart, Inc. His company network runs RIP as the routing protocol. One day, he notices that a Token Ring subnet, 192.168.9.0/24, shuts down. Fred enables the 'debug ip rip' command on the router. Which of the following message received on the router is related to the problematic subnet?

a. Subnet 192.168.9.0, metric 16

b. Subnet 192.168.9.0, metric 15

c. Subnet 192.168.9.0, metric 0

d. Subnet 192.168.9.0, metric 1

e. Subnet 192.168.9.0, metric 255

Question 22

Routing protocols can be generally classified into distance-vector or link-state. Each method has its own advantages and disadvantages. Which of the following routing protocol takes the benefits of both methods?

a. RIP

b. IGRP

c. EIGRP

d. OSPF

e. IS-IS

Question 23

Generally, routing protocols can be classified into classfull and classless routing protocols. Which of the following are categorized as classfull?

a.  All versions of RIP

b. BGP

c. OSPF

d. RIP version 1

e. IGRP

Page 11: CCNA Sample Questions

f.   EIGRP

Question 24

Which of the following statements correctly activate IGRP routing process on a Cisco router?

a.        router igrp 200   network 192.168.22.0  network 10.55.0.0

b.       router igrp 200   network 192.168.22.0 255.255.255.0  network 10.0.0.0 255.0.0.0

c.       router igrp 200   network 192.168.22.0  network 10.0.0.0

d.       router igrp   network 192.168.22.0  network 10.0.0.0

e.       router igrp 200   network 192.168.22.0 10.0.0.0

Question 25

You have been tasked to provide security measure on interface FastEthernet 0/0 of a Cisco router. You create access-list 110 to deny HTTP traffic to the router. Which of the following command should be used to apply the in the inbound direction to the interface?

a. ip access-group 110 inbound

b. access-group 110 in

c. apply access-list 110 in

d. ip access-list 110 inbound

e. ip access-group 110 in

f. access-class 110 in

Question 26

Which of the following statement will permit traffic from subnet 172.168.30.0/24 on a specific interface?

a. access-list 1 permit 172.168.30.0 255.255.255.0

Page 12: CCNA Sample Questions

b. access-list 99 permit 172.168.30.0 0.0.0.255

c. access-list 100 permit 172.168.30.0 0.0.0.255

d. access-list 10 permit 172.168.30.0

e. access-list 100 permit host 172.168.30.0 0.0.0.255

Question 27

Which of the following is a correct access-list statement?

a.  access-list 100

b. access-list 100 allow any except http

c. access-list 100 deny serial 0 ftp http smtp

d. access-list 100 permit ip any 0.0.0.0 255.255.255.255

e. access-list 100 deny ip 172.168.10.2 tcp eq 65 66

Question 28

What IOS command will enable you to display which access-list is attached on a router interface?

a. show ip access-list

b. show ip interface

c. show interface

d. show access-list

e. show access-list interface

Question 29

Miami#debug ppp authentication

BRI0:1 PPP: send CHAP challenge id=58 to remote

BRI0:1 PPP: CHAP challenge from Florida

BRI0:1 PPP: CHAP response received from Florida

Page 13: CCNA Sample Questions

BRI0:1 PPP: CHAP response id=58 received from Florida

BRI0:1 PPP: Send CHAP success id=58 to remote

BRI0:1 PPP: Remote passed CHAP authentication

BRI0:1 PPP: Passed CHAP authentication

BRI0:1 PPP: Passed CHAP authentication with remote

You are examining ISDN BRI dialup connectivity between Miami and Florida routers using PPP encapsulation. You enabled a debug command and obtained the result as shown in the output above. What type of handshake is involved in the PPP authentication?

a.        One-way

b.       Two-way

c.       Three-way

d.       Four-way

e.       No handshake occurred, only simple challenge and response messages

Question 30

The rate in bits per seconds at which the frame relay switch agrees to transfer data is called ___.

a.        Data Link Connection Identifier (DLCI)

b.       Committed Information Rate (CIR)

c.       Peak Information Rate (PIR)

d.       Local Management Interface (LMI)

e.       Committed Rate Measurement Interval (CRMI)

f.         Frame Eligible Committed Network (FECN)

Question 31

A branch office is connected through frame-relay PVCs to the company data centers. What are the required steps to use point-to-point subinterfaces?

a.        Do not configure any network layer addresses on the main interface.

Page 14: CCNA Sample Questions

b.       Assign frame-relay DLCIs on the subinterfaces.

c.       Assign frame-relay DLCIs on the main interface.

d.       Configure layer 3 address on the physical interface.

e.       Configure the subinterfaces to disable split horizon.

Question 32

A branch office has a frame-relay PVC to the corporate data center. The physical cable is connected to interface serial 0 of the branch router. What command displays the LMI, DLCI, and speed of the frame-relay link?

a.        show interface serial 0

b.       show interface frame-relay 0

c.       show frame-relay lmi

d.       show frame-relay serial 0

e.       show statistics frame-relay