CCNA QUESTION & ANSWER



A. What are two benefits of implementing a VLSM addressing scheme? (Choose two.)

allows efficient use of address space

supports hierarchical addressing capability

supports only one subnet mask length throughout the entire network

allows efficient use of larger routing tables to eliminate the need for route summarization

solves the problem of discontiguous networks with classful routing protocols

B. When running NAT, what is the purpose of address overloading?

limit the number of hosts that can connect to the WAN

allow multiple inside addresses to share a single global address

force hosts to wait for an available address

allow an outside host to share inside global addresses

1. What is the Network ID for the IP address 192.168.12.6, assuming default subnet mask?
A: 192.168.12.0

2. What is the Node ID for the IP address 192.168.12.6, assuming default subnet mask?
A: 0.0.0.6

3. What is the Network ID for the IPX address 2c.0000.0c56.de34?
A: 2c

4. What is the Node ID for the IPX address 2c.0000.0c56.de34?
A: 0000.0c56.de34

5. In what order do the five steps of Data Encapsulation take place?
A: 1) User information is converted to data.
2) Data is converted to segments.
3) Segments are converted to packets or datagrams.
4) Packets or datagrams are converted to frames.
5) Frames are converted to bits.

6. What kind of services are provided by the Presentation layer?
A: PICT, JPEG, MIDI, MPEG, ASCII and EBCDIC

7. What kind of services are provided by the Session layer?
A: NFS, SQL, RPC and NetBIOS

8. How do you enable a Banner on a Cisco Router?
A: Router(Config)# banner motd #

9. Which three protocols are correctly matched to their respective transport layer function?
A: TCP = connection oriented
TCP = three way handshake
UDP = no sequence and acknowledgment

10. What are the two ways to display IPX address information on interface Ethernet1?
A: show ipx interface Ethernet1
show interface Ethernet1

11. Which IP-class provides the fewest numbers of Hosts?
A: Class C

12. How do you change the Console password on a router to be sharon?
A: Router(config)# line con 0
Router(config-line)# login
Router(config-line)# password sharon


13. How are the ISDN protocols defined?
A: I - stands for concepts, terminology and services
E - stands for existing telephone network
Q - stands for switching and signaling

14. Your are configuring RIP on your router. What happens when you enter the command
“Router(config-router)# network 175.76.3.0”?
A: RIP has been enabled on the 175.76.3.0 network.

15. What is the command to show both source and destination addresses for IPX?
A: debug IPX routing activity

16. How do you log into User EXEC mode?
A: Press enter and enter userid and the password if necessary.

17. What command instructs the router to load the IOS from Read Only Memory ?
A: boot system rom

18. What is the Frame Relay configuration command for the second subinterface?
A: interface s0.2 point-to-point

19. What is the command level where you enter the access list command?
A: Router(config)#

20. How are routing loops prevented? (Choose four)
A: Route Poisoning
Hold downs
Split horizon
Triggered Updates

21. What's the default subnet mask for a Class A IP address?
A: 255.0.0.0

22. What's the default subnet mask for a Class B IP address?
A: 255.255.0.0

23. What's the default subnet mask for a Class C IP address?
A: 255.255.255.0

24. Troy Technologies has an employee that is working at home. This employee runs big client
server applications and must quickly transfer large files. What solution would be the most cost
effective?
A: Install an ISDN connection at the employee’s house.


25. What is half duplexing?
A: Frames feed into a single cable in one direction at a time.

26. What are the three main methods of flow control?
A: Windowing
Buffering
Source Quench Messaging

27. What are the correct encapsulation types for frame-relay?
A: Cisco & Ietf

28. In IOS editing mode, how do you return to the beginning of command line?
A: Ctrl + a

29. What type of WAN protocol uses PVCs?
A: Frame Relay

30. Given the following IP address: 162.53.21.12
You plan for no more than 126 hosts on the subnet that includes this address. What subnet mask
would you use?
A: 255.255.255.128



31. How would you backup the IOS image to a TFTP server?
A: copy flash tftp

32. What command would you use to get totally out of config mode and return to PRIV mode on the
router?
A: ctrl + z

33. How does "Store-and-Forward" LAN switching method work?
A: Switch waits for the whole frame before forwarding.
Latency varies with different frame sizes.

34. You have a class B IP address with a 12 bit subnet. How many subnets and hosts are available?
A: 4094 subnets, 14 hosts

35. You have the following access list command:
access-list 800 permit 3d 4a
You also have the following interface configurations:
interface Ethernet 0
ipx network 4a
ipx access-group 800 out
interface Ethernet 1
ipx network 3d
interface Ethernet 2
ipx network 5c
Which two statements are true?
A: Traffic from network 3d for network 4a will be forwarded our e0.
The access list is applied to an outgoing interface and filters outbound traffic


36. Match the IPX Frame Type with the correct IOS encapsulation?
A: IPX Frame Type Cisco Encapsulation Type
Ethernet_802.3 Novell-ether (Default)
Ethernet_802.2 Sap
Ethernet_II Arpa
Ethernet_Snap Snap
Token Ring Sap (Default)
Token Ring_Snap Snap
Fddi_Snap Snap (Default)
Fddi_802.3 Sap
Fddi_Raw Novell-fddi
HDLC HDLC (Default)

37. Router configuration can be done by what four methods?
A: Memory (NVRAM)
Terminal (Console)
Network (TFTP)
Overwrite


38. To make a router boot from a file called FRED on the TFTP server at IP address 171.59.117.19,
which command should be entered?
A: Router(config)# boot system TFTP fred 171.59.117.19

39. How do you change the Auxiliary password to Cisco?
A: Router(config)# line aux 0
Router(config-line)# login
Router(config-line)# password Cisco

40. How do you change the Virtual Terminal password to CCIE?
A: Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password CCIE

41. Which statement describes a difference between STP and RSTP?

RSTP is proprietary while STP is defined by IEEE.

RSTP defines four port states while STP defines five port states.

When a topology changes, RSTP reconfigures the spanning tree in less than 1 second.

STP is more commonly used in large switched enterprise networks that require faster recovery.



42. In an enterprise network, why would voice traffic typically require a dedicated VLAN?

It guarantees end-to-end delivery for voice traffic.

It guarantees higher bandwidth for voice traffic.

It separates voice traffic from data traffic so data traffic does not impact voice traffic.

It provides backup support for voice traffic because voice traffic is more critical than data traffic.


43 How does a VPN work to support remote user productivity?
It uses SSL to encrypt remote user logins to the corporate intranet.
It uses secure Telnet for remote user connections to internal network devices.
It creates a virtual circuit that allows real-time communications between any two Internet endpoints.


Comments

Popular posts from this blog

Information Security Interview Questions & Answers

MCSE INTERVIEW QUESTIONS AND ANSWER

OSI MODEL (Open Systems Interconnection model )