Exit-Exam - 230218 - 161311 NW Device & Conf
Exit-Exam - 230218 - 161311 NW Device & Conf
Exit-Exam - 230218 - 161311 NW Device & Conf
Funerary-2015
1. Which Cisco IOS mode displays a prompt of Router#?
A. user EXEC mode
B. setup mode
C. privileged EXEC mode
D. global configuration mode
2. Which switch command would a network administrator use to determine if there are
encapsulation or media errors on an interface?
A. show ip interface
B. show arp
C. show interfaces
D. show line
3. Refer to the exhibit. An administrator is trying to configure the switch but receives the error
message that is displayed in the exhibit. What is the problem?
A. The administrator must first enter privileged EXEC mode before issuing the
command.
B. The entire command, configure terminal, must be used.
C. The administrator must connect via the console port to access global configuration
mode.
The administrator is already in global configuration mode
4. Refer to the exhibit. Which element of IOS syntax is the expression MainOffice?
A. an argument
B. a subcommand
C. a command
D. a keyword
5. Which interface is the default SVI on a Cisco switch?
A. VLAN 1
B. VLAN 99
C. FastEthernet 0/1
D. GigabitEthernet 0/1
A. 128.107.255.1
B. 128.108.100.10
C. 128.106.10.100
D. 128.107.255.254
8. When configuring SSH on a router to implement secure network management, a network
engineer has issued the login local and transport input ssh line vty commands. What three
additional configuration actions have to be performed to complete the SSH configuration?
(Choose three.)
A. Create a valid local username and password database.
B. Configure the correct IP domain name.
C. Configure role-based CLI access.
D. Generate the asymmetric RSA keys.
E. Set the user privilege levels.
9. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes
and interfaces that can be protected with passwords. (Choose three.)
A. privileged EXEC mode
B. router configuration mode
C. VTY interface
D. Ethernet interface
E. console interface
F. boot IOS mode
10. Which one of the following network devices has only two ports?
A. Router
B. Bridge
C. Both a and b
D. None of the above
11. Which one of the following network devices transmits the data in the form of packets?
A. Router
B. Bridge
C. Both a and b
D. None of the above
12. Which one of the following network devices is used to connect different networks?
A. Hub
B. Switch
C. Router
D. All
13. Which one of the following network devices doesn’t support both dynamic and static
routing?
A. Gateway
B. Router
C. Server
D. Pc
14. Which one of the following network devices doesn’t have any security measures to protect
the network?
A. Modem
B. Router
C. Switch
D. Server
15. What type of address is physically assigned to the NIC of a workstation?
A. MAC address
B. host address
C. IP address
D. network address
16. An administrator is adding voice and video service capabilities to an existing network. What
design requirement is being satisfied by this situation?
A. availability
B. security
C. manageability
D. scalability
17. A company is considering implementing virtualization solutions in a data center. What are
three advantages of virtualization the company can expect to benefit from?
A. improved disaster recovery
B. less employee training
C. reduced security requirements
D. shorter work week
18. A user calls to report that a PC cannot access the internet. The network technician asks the
user to issue the command ping 127.0.0.1 in a command prompt window. The user reports
that the result is four positive replies. What conclusion can be drawn based on this
connectivity test?
A. The IP address obtained from the DHCP server is correct.
B. The TCP/IP implementation is functional.
C. The PC can access the Internet. However, the web browser may not work.
D. The PC can access the network. The problem exists beyond the local network.
19. user issues a ping 198.51.100.5 command and receives a response that includes a code of 0.
What does this code represent?
A. network unreachable
B. host unreachable
C. port unreachable
D. protocol unreachable
20. A network administrator establishes a connection to a switch via SSH. What characteristic
uniquely describes the SSH connection?
A. direct access to the switch through the use of a terminal emulation program
B. remote access to the switch through the use of a telephone dialup connection
C. on-site access to a switch through the use of a directly connected PC and a console cable
D. out-of-band access to a switch through the use of a virtual terminal with password
authentication
E. remote access to a switch where data is encrypted during the session
21. ----------- is changing their routing decision to reflect changing the topology
A. Nonadaptive algorithm
B. Adaptive algorithm
C. Static algorithm
D. Recursive algorithm
22. A data center has recently updated a physical server to host multiple operating systems on a
single CPU. The data center can now provide each customer with a separate web server
without having to allocate an actual discrete server for each customer. What is the
networking trend that is being implemented by the data center in this situation?
A. maintaining communication integrity
B. online collaboration
C. virtualization
D. BYOD
23. Which IPv4 header fields have no equivalent in an IPv6 header?
A. protocol
B. TTL
C. version
D. flag
24. Refer to the exhibit. A ping to PC2 is issued from PC0, PC1, and PC3 in this exact order.
Which MAC addresses will be contained in the S1 MAC address table that is associated with
the Fa0/1 port?
A. just the PC1 MAC address
B. just PC0 and PC1 MAC addresses
C. just the PC0 MAC address
D. PC0, PC1, and PC2 MAC addresses
E. just the PC2 MAC address
25. Which two items are used by a host device when performing an ANDing operation to
determine if a destination address is on the same local network?
A. network number and network number
B. destination IP address and subnet mask
C. source MAC address and subnet mask
D. destination MAC address and network number
26. A home network has both wired and wireless connectivity. From a laptop computer, the user
issues a ping to the wireless printer located in another room. The first two echo requests fail,
but the last two succeed. Additional pings are all successful. Why do the first two echo
requests fail?
A. The computer and the printer must join the wireless network first and that process
takes time.
B. The distance between the computer and the printer causes delay on the first two
pings.
C. The wireless printer must be activated and that takes time.
D. The computer must use ARP to obtain the MAC address of the printer and this
process takes time.
27. A web designer calls to report that the web server web-s1.cisco.com is not reachable through
a web browser. The technician uses command line utilities to verify the problem and to begin
the troubleshooting process. Which two things can be determined about the problem
A. A router is down between the source host and the server web-s1.cisco.com.
B. The web server at 192.168.0.10 is reachable from the source host.
C. The default gateway between the source host and the server at 192.168.0.10 is down.
D. DNS cannot resolve the IP address for the server web-s1.cisco.com.
E. There is a problem with the web server software on web-s1.cisco.com
28. Which three commands are used to set up secure access to a router through a connection to
the console interface?
A. line vty 0 4
B. password cisco
C. interface fastethernet 0/0
D. enable secret cisco
30. Which forwarding action does a switch take when the destination MAC address of an
Ethernet frame is an unknown unicast?
A. The switch forwards the frame to the default gateway.
B. The switch forwards the frame the same way it does for broadcast and multicast MAC
addresses.
C. The switch drops the frame.
D. The switch forwards the frame out a specified port for this type of address.
31. An administrator is troubleshooting connectivity on the office network. PC1 is able to send
print jobs to Printer1, but is unable to access File Server1. Which action would correct the
problem?
When testing the configuration, you find that Host A in the diagram cannot ping Host B.
Which of the following pairs of connections are required to be in the same subnet for
Host A to be able to ping Host B? (Choose all that apply.)
A. The IP address of Host A and the IP address of the Fa0/0 interface of Router A
B. The IP address of the Fa0/0 interface of Router A and the IP address of the Fa0/0
interface of Router B
C. The IP address of Host A and the IP address of the Fa0/0 interface of Router
D. The IP address of Host A and the IP address of Switch A
E. The IP address of the S 0/0 interface of Router A and the IP address of the S 0/0
interface of Router B
F. The IP address of Host A and the IP address of Host B
G. The IP address of Host B and the IP address of the Fa0/0 interface of Router B
33. When a packet is forwarded through a network from one host to another host, which of the
following fields in the Ethernet frame will change at every hop?
A. Source IP address
B. Destination MAC address
C. Source port number
D. Destination IP address
34. You are the network administrator for your company. You have installed a new router in
your network. You want to establish a remote connection from your
computer to the new router so it can be configured. You are not concerned about security
during the remote connection.
Which Cisco IOS command should you use to accomplish the task?
A. ssh
B. telnet
C. terminal
D. virtual
35. You are configuring a WAN connection between two offices. You cannot ping between the
routers in a test. The Serial0 interface on RouterA is connected to the
Serial1 interface on RouterB.
The commands you have executed are shown below. What is the problem with the
configuration?
A. The passwords are incorrectly configured
B. The usernames are incorrectly configured
C. The wrong interface has been configured
D. The encapsulation is incorrect on RouterA
36. What command would be used to verify trusted DHCP ports?
A. show mls qos
B. show ip dhcp snooping
C. show ip trust
D. show ip arp trust
37. RouterA and RouterB, which connect two locations, are unable to communicate. You run the
show running-configuration command on both router interfaces,
RouterA and RouterB. The following is a partial output
Based on the information given in the output, what are two likely causes of the problem?
A. The IP address defined is incorrect.
B. Both routers cannot have an identical clock rate.
C. The Layer 2 framing is misconfigured.
D. At least one of the routers must have the ip mroute-cache command enabled.
38. You are discovering that there are differences between the configuration of EIGRP for IPv6
and EIGRP for IPv4. Which statement is true with regard to the
difference?
A. A router ID is required for both versions
B. A router ID must be configured under the routing process for EIGRP for IPv4
C. AS numbers are not required in EIGRP for IPv6
D. AS numbers are not required in EIGRP for IPv4
39. Which of the following techniques is NOT used by distance vector protocols to stop routing
loops in a network?
A. Split horizon
B. Spanning Tree Protocol (STP)
C. Holddowns
D. Route poisoning
40. You are a network administrator for your organization. Your organization has two Virtual
LANs, named Marketing and Production. All Cisco 2950 switches in the network have both
VLANs configured on them. Switches A, C, F, and G have user machines connected for both
VLANs, whereas switches B, D, and E have user machines connected for the Production
VLAN only. (Click the Exhibit(s) button to view the network diagram.)You receive a request
to configure Fast Ethernet port 0/2 on Switch B for a user computer in the Marketing VLAN.
VLAN numbers for the Marketing and Production VLANs are 15 and 20, respectively.Which
Cisco 2950 switch command should you use to configure the port?
A. SwitchB(config-if)#switchport trunk vlan 15
B. SwitchB(config)#switchport access vlan 15
C. SwitchB(config-if)#switchport access vlan 15
D. SwitchB(config-if)#switchport trunk vlan 15, 20
41. Which Cisco IOS command is used on a Cisco Catalyst 6500 series switch to view the
spanning-tree protocol (STP) information for a virtual LAN (VLAN)?
A. show spanning tree
B. show spanning-tree vlan
C. show spantreeCB989129A5F974833949052CFB2F2
D. show spantree vla
42. Which of the following is NOT a true statement regarding Virtual Private Networks (VPNs)?
A. A VPN is a method of securing private data over public networks
B. IPsec is a method for providing security over VPN
C. Frame Relay is a Layer 3 VPN technology
D. IPsec provides packet-level encryption
E. A Cisco VPN solution provides increased security, reduced cost, and scalability
43. Which of the following is NOT a VLAN Trunking Protocol (VTP) mode of operation?
A. client
B. server
C. virtual
D. transparent
44. A router is running a classful routing protocol. Which command will enable this router to
select a default route when routing to an unknown subnet of a network for
which it knows the major network?
A. ip classless
B. no ip classless
C. auto-summary85CB989129A5F974833949052CFB2F2
D. no auto-summary
45. Which Cisco IOS command is used to configure encapsulation for a PPP serial link on a
Cisco router?
A. encapsulation ppp
B. encapsulation ip ppp
C. ip encapsulation ppp
D. encapsulation ppp-synch
46. When the copy running-config startup-config command is issued on a router, where is the
configuration saved?
A. Random access memory (RAM)
B. Flash
C. Non-volatile random access memory (NVRAM)
D. Read-only memory (ROM)
47. What would be the effect of configuring a loopback interface on RouterA with an address of
192.168.1.50/24?
A. Router B would become the designated router
B. Router A would become the designated router
C. Router C would become the designated router
D. Router A would become the backup designated router
48. Which type of network connection requires a straight-through cable?
A. host to host
B. switch to router
C. switch to switch
D. host to router's Ethernet port
49. What command would you run to determine which switch is the root bridge for a particular
VLAN?
A. show spantree vlan
B. show spanning tree
C. show spanning-tree vlan
D. show vlan spantree
50. Which three statements are TRUE regarding Network Address Translation (NAT)? (Choose
three.)
A. It connects different Internet Service Providers (ISPs).
B. It can act as an address translator between the Internet and a local network.
C. It conserves IP addresses.
D. It creates additional IP addresses for the local network.
E. It helps the local network connect to the Internet using unregistered IP
addresses.
51. You are the switch administrator for InterConn. The network is physically wired as shown in
the diagram. You are planning the configuration of STP. The majority
of network traffic runs between the hosts and servers within each VLAN.
You would like to designate the root bridges for VLANS 10 and 20. Which switches should
you designate as the root bridges?
A Switch A for VLAN 10 and Switch B for VLAN 20
B. Switch A for VLAN 10 and Switch C for VLAN 20
C Switch D for VLAN 10 and Switch B for VLAN 20
D. Switch E for VLAN 10 and Switch A for VLAN 20
52. What is the purpose of frame tagging in Virtual LAN (VLAN) configurations?
A. inter-VLAN routing
B. encryption of network packets
C. frame identification over trunk links
D. frame identification over access links
53. What is the primary benefit of the Virtual Local Area Network (VLAN) Trunking Protocol
(VTP)?
A. broadcast control
B. frame tagging
C. inter-VLAN routing
D. consistent VLAN configuration across switches in a domain
54. Which of the following is NOT a feature offered by Enhanced Interior Gateway Routing
Protocol (EIGRP)?
A. variable length subnet masks (VLSM)
B. partial updates
C. neighbor discovery mechanism
D. multiple vendor compatibility
55. Consider the following diagram:
Which of the following routing protocols could NOT be used with this design?
A. RIPv1
B. RIPv2
C. EIGRP
D. OSPF
56. You run the following command:
switch# show ip interface brief
What information is displayed?
A. A summary of the IP addresses and subnet mask on the interface
B. A summary of the IP addresses on the interface and the interface's status
C. The IP packet statistics for the interfaces
D. The IP addresses for the interface and the routing protocol advertising the network
57. Which Cisco Internetwork Operating System (IOS) command would be used to set the
privileged mode password to "cisco"?
A. router(config)# enable password cisco
B. router# enable secret cisco
C. router(config)# line password cisco
D. router(config-router)# enable password cisco
58. Which of the following characteristics are NOT shared by RIPv1 and RIPv2?
A. They share an administrative distance value
B. They use the same metric
C. They both send the subnet mask in routing updates
D. They have the same maximum hop count
59. Enhanced Interior Gateway Routing Protocol (EIGRP) uses which algorithm to select the
best path to the destination?
A. Diffusing Update Algorithm (DUAL)
B. Dijkstra algorithm
C. Bellman-Ford algorithm
D. Shortest Path First (SPF) algorithm
60. Which Enhanced Interior Gateway Routing Protocol (EIGRP) packet type is used for
neighbor discovery?
A. Hello
B. Update
C. Queries
D. Replies
61. Which type of address never changes on a device and is similar to a home address?
A. MAC address
B. IP address
C. network address
D. logical address
62. On which of the following networks will OSPF elect a designated router (DR)?
A. Broadcast
B.Reflection
C. Point-to-point
D. Point-to-multipoint
63. Which Cisco IOS command can be issued on a router to test the connectivity of one
interface from another interface on the same router?
A. ping (with no address specified)
B. ping (with an address specified)
C. tracert
D. traceroute
64. What port types are available for Rapid Spanning Tree Protocol (RSTP) but NOT available
in Spanning Tree Protocol (STP)? (Choose two.)
A. Root port
B. Backup port
C. Alternate port
D. Designated port
E. Learning port
A. Hub
B. Bridge
C. Switch
D. Router
68. Which Cisco Internetwork Operating System (IOS) command is used to assign a router a
name for identification?
A. description
B. banner motd
C. hostname
D. banner exec
69. You instructed your assistant to add a new router to the network. The routers in your
network run OSPF. The existing router, OldRouter, is configured as follows:
router ospf 1 network 192.168.5.0
0.0.0.255 area 0 network 192.168.10.0
0.0.0.255 area 0
The OldRouter interface that connects to NewRouter is 192.168.5.3/24. Your assistant shows
you the configuration that will be implemented:
newrouter(config)# router ospf 1 newrouter(config-router)#
network 192.168.5.0 255.255.255.0 area 0 What is wrong with this
configuration?
A. The area ID is incorrectly configured.
B. The wildcard mask is incorrectly configured.
C. The network statement is incorrectly configured.
D. The process ID number is incorrectly configured
70. With respect to the network shown below, which of the following statements are true when
R2 sends a packet to the 192.168.6.0/24 network? (Choose all that
apply.)
A. If RIPv1 is in use, the path taken will be R2 - R4 - R3
B. If both RIPv2 and EIGRP are in use, the EIGRP route will be placed in the routing table
C. If EIGRP is in use, the only path taken will be R2 - R4 - R3
D. If RIPv2 is in use, the path taken will be R2 - R3
71. You have three EIGRP routers that are connected as shown in the diagram below
Router A and Router C do not seem to be exchanging information. You execute commands
on all three routers, and receive as output the information shown below:
73. If a routing table contains multiple routes for the same destination, which were inserted by
the following methods, which route will the router use to reach the
destination network?
A. The route inserted by RIP
B. The route inserted by OSPF
C. The route inserted by BGP
D. The route configured as a static route
74. Which of the following is NOT a characteristic of Open Shortest Path First (OSPF)?
A. Is a Cisco-proprietary routing protocol
B. Has a default administrative distance of 110
C. Supports authentication
D. Uses cost as the default metric
75. Refer to the following configuration on a Cisco router to allow Telnet access to remote
users:
Router(config)#line vty 0 2
Router(config-line)#login
Router(config-line)#password guest
How many users can Telnet into this router at the same time?
A. 0
B. 1
C. 2
D. 3
E. 5
76. Your company's network must make the most efficient use of the IP address space. In the
following diagram, the circles define separate network segments. The requirements of each
network segment are given in the diagram.
Users complain of connectivity issues. You need to discover the problems with the network
configuration. What are the three problems with the network diagram?
A. The 172.16.1.0/30 segment requires more user address space.
B. The 172.16.2.0/26 segment requires more user address space.
C. The 172.16.3.0/25 segment requires more user address space.
D. The 172.16.2.64/26 segment requires more user address space
77. Which type of Dynamic Host Configuration Protocol (DHCP) transmission is used by a host
to forward a DHCPDISCOVER packet to locate a DHCP server on the
network?
A. unicast
B. broadcast
C. multicast
D. anycast
78. Which Cisco command will display the version and configuration data for Secure Shell
(SSH)?
A. show ssh
B. show ip ssh
C. debug ssh
D. debug ip ssh
79. Your assistant has been assigned the task of configuring one end of a WAN link between
two offices. The link is a serial connection and the router on the other end is a non-Cisco
router. The router in the other office has an IP address of 192.168.8.6/24. The connection will
not come up, so you ask your assistant to show you the commands he configured on the
Cisco router. The commands he executed are shown below.
Ciscorouter(config)# interface serial0/0
Ciscorouter(config-if)# ip address 192.168.8.5 255.255.255.0 Ciscorouter(configif)# no shut
What command(s) should he run to correct the configuration?
A. Ciscorouter(config-if)# no ip address 192.168.8.5Ciscorouter(config-if)# ip address
192.168.8.10
B. Ciscorouter(config-if)# encapsulation ppp
C. Ciscorouter(config-if)# encapsulation ansi
D. Ciscorouter(config-if)# authentication chap
80. Which connection provides a secure CLI session with encryption to a Cisco switch?
A. a console connection
B. an AUX connection
C. a Telnet connection
D. an SSH connection
82. On which switch interface would an administrator configure an IP address so that the switch
can be managed remotely?
A. FastEthernet0/1
B. VLAN 1
C. vty 0
D. console 0
83. Host A is configured for DHCP, but it is not receiving an IP address when it powers up.
What is the most likely cause?
86. Which command is used on a Catalyst 2950 series switch to enable basic port security on
the interface?
A. set port-security
B. switchport port-security
C. set port-security enable
D. switchport port-security enable
87. Which Cisco Internetwork Operating System (IOS) command is used to encrypt passwords
on Cisco routers?
A. password secure
B. service encryption-password
C. service password-encryption
D. enable password
88. A network technician suspects that a particular network connection between two Cisco
switches is having a duplex mismatch. Which command would the technician use to see the
Layer 1 and Layer 2 details of a switch port?
A. show mac-address-table
B. show ip interface brief
C. show interfaces
D. show running-config
89. Where are Cisco IOS debug output messages sent by default?
A. Syslog server
B. console line
C. memory buffers
D. vty lines
93. You are troubleshooting a problem with two routers configured in a HSRP group. You
intended to configure the routers so that Router A and Router B would each track their
respective Fa0/1 interfaces and decrement their priorities for several VLAN groups if the
tracked interface went down. However, you find that Router A is not taking over as the active
device for the HSRP group on VLAN 101 when the Fa0/1 interface on Router B fails.
Which command would NOT be useful for discovering the problem?
A. show running-configuration
B. show vlans
C. show standby brief
D. show standby
94. A new switch is added to the network, and several production VLANs are shut down.
Which of the following is a probable cause for this scenario? (Choose two.)
A. The new switch has a lower configuration revision number than existing switches.
B. The new switch has a higher configuration revision number than existing switches.
C. The new switch is operating in transparent mode.
D. The new switch is operating in server mode
95. Which two statements are TRUE of Internet Protocol (IP) addressing? (Choose two.)
A. Public addresses are registered with the Internet Assigned Numbers Authority (IANA).
B. These addresses are publicly registered with the Internet Service Provider (ISP).
C Private addresses are allocated by the Internet Assigned Numbers Authority (IANA
D. The ranges of public IP addressing are 10.0.0.0 to 10.255.255.255, 172.16.0.0 to
172.31.255.255, and 192.168.0.0 to 192.168.255.255.
96. You just finished configuring VLAN Trunking Protocol (VTP) in a network containing five
switches. One of the switches is not receiving VLAN information from the
switch that is acting as the server.
Which of the following could NOT be a reason why the switch is not receiving the
information?
A. The VTP domain name on the switch may be misspelled
B. The VTP password may be misspelled on the switch
C. The configuration revision number may be out of sync
D. The VTP version used on the switch may be different
97. Which of the following commands will let you see the current operating mode for a switch
port?
A. show interface fastethernet0/1 detail
B. show controllers fastethernet0/1
C. show interface fastethernet0/1 status
D. show interfaces fastethernet0/1 switchport
98. Your network is configured as shown in the following exhibit. When you trace traffic
sourced from R3 destined for a LAN network off of R2 (not shown in the
diagram), you see the traffic is being forwarded from R1 to ISP1 rather than to R2.