Home Mobility Fundamentals Linux Essentials Introduction to Linux II
C++ L1 CCNA7 PremiumExam SECFND About
Home IT Essentials Version 6 Network Essentials CCNA1 v6.0 CCNA2 v6.0
CCNA3 v6.0 CCNA4 v6.0 CCNA v6.0 PT LAB Packet Tracer 7
Walden University Online
Masters and PhD Degrees
Gain the Skills You Need to Grow as a Professional. Apply Now.
international.waldenu.edu
CCENT (ICND1) Practice
Certification Exam – Categories
Online Assessment Answer – CCNA1 v6.0
Answer – CCNA2 v6.0
Posted on December 5, 2017 by admin
Answer – CCNA3 v6.0
CCENT (ICND1) Practice Answer – CCNA4 v6.0
Certification Exam - Online Answer – NDG Linux Essentials
Answer – Networking Essentials
Assessment IT Essentials – Online-Test
Time limit: 01:58:52 Online Assessment – CCNA1 v6.0
Online Assessment – CCNA2 v6.0
1. Question Online Assessment – CCNA3 v6.0
A network technician is configuring port Online Assessment – CCNA4 v6.0
security on a LAN switch interface. The Online Assessment – NDG Linux Essentials
security policy requires host MAC addresses to Online Assessment – Networking
be learned dynamically, stored in the address Essentials
table, and saved to the switch running Online Assessment – CCNA2 v6.0
configuration. Which command does the Packet Tracer 7 Download
technician need to add to the following Uncategorized
configuration to implement this policy?
Switch(config)# interface fa0/1
Switch(config-if)# switchport mode access
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security
maximum 40
Switch(config-if)# switchport port-security
mac-address
Switch(config-if)# switchport port-security
mac-address sticky Recent Posts
Switch(config-if)# switchport port-security Do Not Share Too Much on Social Media
mac-address 000B.FCFF.E880 Protecting the Organization
Email and Web Browser Privacy
OAuth 2.0
Pass Security+ Exam Fast
Two Factor Authentication
Verified & Correct Answers By Comptia Experts
2. Question
On which switch interface would an
administrator configure an IP address so
that the switch can be managed remotely?
FastEthernet0/1
Simplify cloud complexity
VLAN 1
Think Dynatrace, the all-in-one
vty 0 software intelligence solution.
console 0
June 2019
3. Question M T W T F S S
1 2
Refer to the exhibit. Match the packets with
3 4 5 6 7 8 9
their destination IP address to the exiting
10 11 12 13 14 15 16
interfaces on thee router. (Not all targets
17 18 19 20 21 22 23
are used.)
24 25 26 27 28 29 30
« Jun
CCENT (ICND1) 021
Sort elements
FastEthernet0/0 FastEthernet1/0
Serial0/0/0 FastEthernet0/1
FastEthernet1/1
The packet is dropped.
packets
with
destination
of
172.17.6.15
packets
with
destination
of
172.17.14.8
packets with
destination
of
172.17.12.10
packets
with
destination
of
172.17.10.5
packets
with
destination
of
172.17.8.20
4. Question
Refer to the exhibit. A ping to PC3 is issued
from PC0, PC1, and PC2 in this exact order.
Which MAC addresses will be contained in
the S1 MAC address table that is associated
with the Fa0/1 port?
CCENT (ICND1) 020
just PC0 and PC1 MAC addresses
just the PC0 MAC address
PC0, PC1, and PC2 MAC addresses
just the PC1 MAC address
just the PC2 MAC address
5. Question
Which feature on a Cisco router permits the
forwarding of traffic for which there is no
specific route?
next-hop
gateway of last resort
route source
outgoing interface
6. Question
Fill in the blank.
When port security is enabled, a switch port
uses the default violation mode of
…………………. until specifically configured
to use a different violation mode.
7. Question
Refer to the exhibit. Inter-VLAN
communication between VLAN 10, VLAN 20,
and VLAN 30 is not successful. What is the
problem?
CCENT (ICND1) 019
The access interfaces do not have IP
addresses and each should be configured
with an IP address.
The switch interface FastEthernet0/1 is
configured as an access interface and
should be configured as a trunk interface.
The switch interface FastEthernet0/1 is
configured to not negotiate and should be
configured to negotiate.
The switch interfaces FastEthernet0/2,
FastEthernet0/3, and FastEthernet0/4 are
configured to not negotiate and should be
configured to negotiate.
8. Question
Which two issues might cause excessive
runt and giant frames in an Ethernet
network? (Choose two.)
native VLAN mismatch
damaged cable connector
a malfunctioning NIC
excessive collisions
using the incorrect cable type
incorrectly configured auto-MDIX feature
9. Question
How will a router handle static routing
differently if Cisco Express Forwarding is
disabled?
It will not perform recursive lookups.
Serial point-to-point interfaces will require
fully specified static routes to avoid routing
inconsistencies.
Ethernet multiaccess interfaces will
require fully specified static routes to avoid
routing inconsistencies.
Static routes that use an exit interface will
be unnecessary.
10. Question
Refer to the exhibit. A network
administrator is reviewing port and VLAN
assignments on switch S2 and notices that
interfaces Gi0/1 and Gi0/2 are not included
in the output. Why would the interfaces be
missing from the output?
CCENT (ICND1) 018
There is a native VLAN mismatch
between the switches.
There is no media connected to the
interfaces.
They are administratively shut down.
They are configured as trunk interfaces.
11. Question
Which address type is not supported in
IPv6?
private
multicast
unicast
broadcast
12. Question
Refer to the exhibit. A technician is
programming switch SW3 to manage voice
and data traffic through port Fa0/20. What, if
anything, is wrong with the configuration?
CCENT (ICND1) 001
There is nothing wrong with the
configuration.
Interface Fa0/20 can only have one VLAN
assigned.
The mls qos trust cos command should
reference VLAN 35.
The command used to assign the voice
VLAN to the switch port is incorrect.
13. Question
Which two devices allow hosts on different
VLANs to communicate with each other?
(Choose two.)
Layer 2 switch
Layer 3 switch
hub
repeater
router
14. Question
How many /30 subnets can be created from
one /27 subnet?
15. Question
A network administrator is using the router-
on-a-stick model to configure a switch and
a router for inter-VLAN routing. What
configuration should be made on the switch
port that connects to the router?
Configure the port as an access port and
a member of VLAN1.
Configure the port as an 802.1q trunk
port.
Configure the port as a trunk port and
assign it to VLAN1.
Configure it as a trunk port and allow only
untagged traffic.
16. Question
A network administrator is designing an
IPv4 addressing scheme and requires these
subnets.
1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hosts
Which combination of subnets and masks
will provide the best addressing plan for
these requirements?
9 subnets of 126 hosts with a
255.255.255.128 mask
3 subnets of 126 hosts with a
255.255.255.128 mask
6 subnets of 30 hosts with a
255.255.255.224 mask
3 subnets of 126 hosts with a
255.255.255.192 mask
6 subnets of 30 hosts with a
255.255.255.240 mask
1 subnet of 126 hosts with a
255.255.255.192 mask
2 subnets of 80 hosts with a
255.255.255.224 mask
6 subnets of 30 hosts with a
255.255.255.240 mask
17. Question
A network administrator has been allocated
the IPv4 10.10.240.0/20 block of addresses
for a LAN. Two devices on two different, but
contiguous, subnets on the LAN have been
assigned the addresses 10.10.247.1/21 and
10.10.248.10/24, respectively. The
administrator has to create a third subnet
from the remaining address range. To
optimize the use of this address space, the
new subnet will follow on directly from the
existing subnets. What is the first available
host address in the next available subnet?
10.10.248.17
10.10.249.1
10.10.250.1
10.10.255.17
18. Question
When creating an IPv6 static route, when
must a next-hop IPv6 address and an exit
interface both be specified?
when CEF is enabled
when the static route is a default route
when the next hop is a link-local address
when the exit interface is a point-to-point
interface
19. Question
Which statement describes the Cisco
License Manager?
It is a free, standalone software
application for deploying Cisco software
licenses across the network.
It is a web-based portal for getting and
registering individual software licenses.
It is a centralized TFTP server that
enables control of the number and revision
level of Cisco IOS images.
It is an organized collection of processes
and components used to activate Cisco IOS
software feature sets by obtaining and
validating Cisco software licenses.
20. Question
After a license has been purchased and
installed, what is the next step that is
required before it is activated?
Reboot the router.
Copy the running configuration to
NVRAM.
Copy the running configuration to flash.
Issue the license boot module technology-
package command.
21. Question
An administrator wants to replace the
configuration file on a Cisco router by
loading a new configuration file from a
TFTP server. What two things does the
administrator need to know before
performing this task? (Choose two.)
router IP address
TFTP server IP address
name of the configuration file that is
currently stored on the router
name of the configuration file that is
stored on the TFTP server
configuration register value
22. Question
Refer to the exhibit. A switch with a default
configuration connects four hosts. The ARP
table for host A is shown. What happens
when host A wants to send an IP packet to
host D?
CCENT (ICND1) 017
Host A sends an ARP request to the MAC
address of host D. Host D responds with its
IP address.
Host D sends an ARP request to host A.
Host A responds with its MAC address.
Host A sends out the packet to the switch.
The switch adds the MAC address for host
D to the frame and forwards it to the
network.
Host A sends out a broadcast of
FF:FF:FF:FF:FF:FF. Every other host
connected to the switch receives the
broadcast and host D responds with its MAC
address.
23. Question
Refer to the exhibit. Host A sends a data
packet to host B. What will be the
addressing information of the data packet
when it reaches host B?
CCENT (ICND1) 016
24. Question
A user sends an HTTP request to a web
server on a remote network. During
encapsulation for this request, what
information is added to the address field of
a frame to indicate the destination?
the MAC address of the destination host
the network domain of the destination
host
the MAC address of the default gateway
the IP address of the default gateway
25. Question
An administrator who is troubleshooting
connectivity issues on a switch notices that
a switch port configured for port security is
in the err-disabled state. After verifying the
cause of the violation, how should the
administrator re-enable the port without
disrupting network operation?
Reboot the switch.
Issue the no shutdown command on the
interface.
Issue the no switchport port-security
command, then re-enable port security.
Issue the no switchport port-security
violation shutdown command on the
interface.
26. Question
Refer to the exhibit. A network technician
issues the command show vlan to verify the
VLAN configuration. Based on the output,
which port should be assigned with native
VLAN?
CCENT (ICND1) 015
Gig0/1
Fa0/12
Fa0/20
Fa0/24
27. Question
Data is being sent from a source PC to a
destination server. Which three statements
correctly describe the function of TCP or
UDP in this situation? (Choose three.)
The UDP destination port number
identifies the application or service on the
server which will handle the data.
TCP is the preferred protocol when a
function requires lower network overhead.
UDP segments are encapsulated within
IP packets for transport across the network.
The source port field identifies the running
application or service that will handle data
returning to the PC.
The TCP source port number identifies
the sending host on the network.
The TCP process running on the PC
randomly selects the destination port when
establishing a session with the server.
28. Question
Which three statements characterize UDP?
(Choose three.)
UDP provides basic connectionless
transport layer functions.
UDP provides connection-oriented, fast
transport of data at Layer 3.
UDP relies on application layer protocols
for error detection.
UDP is a low overhead protocol that does
not provide sequencing or flow control
mechanisms.
UDP relies on IP for error detection and
recovery.
UDP provides sophisticated flow control
mechanisms.
29. Question
What are two reasons why an administrator
might choose to use static routing rather
than dynamic routing? (Choose two.)
Static routing is easier to maintain in large
networks.
Static routing is more secure.
Static routing is more scalable.
Static routing uses less router processing
and bandwidth.
Static routing does not require complete
knowledge of the whole network.
30. Question
A network engineer is troubleshooting
connectivity issues among interconnected
Cisco routers and switches. Which
command should the engineer use to find
the IP address information, host name, and
IOS version of neighboring network
devices?
show version
show ip route
show interfaces
show cdp neighbors detail
31. Question
Refer to the exhibit. A network
administrator issues the show lldp
neighbors command to display information
about neighboring devices. What can be
determined based on the information?
CCENT (ICND1) 014
Device B1 is a WLAN access point.
Device C1 is a switch.
Device A1 is connected to the port Fa0/5
on device B1.
Device C1 is connected to device B1
through the port Fa0/3.
32. Question
What are three characteristics of the
CSMA/CD process? (Choose three.)
Devices can be configured with a higher
transmission priority.
A jam signal indicates that the collision
has cleared and the media is not busy.
A device listens and waits until the media
is not busy before transmitting.
The device with the electronic token is the
only one that can transmit after a collision.
All of the devices on a segment see data
that passes on the network medium.
After detecting a collision, hosts can
attempt to resume transmission after a
random time delay has expired.
33. Question
Refer to the exhibit. Which three events will
occur as a result of the configuration
shown on R1? (Choose three.)
CCENT (ICND1) 013
Messages that are sent to the syslog
server will be limited to levels 3 or lower.
Messages that are sent to the syslog
server will be limited to levels 3 and higher.
Only traffic that originates from the
GigabitEthernet 0/1 interface will be
monitored.
Messages that are sent to the syslog
server will use 192.168.1.5 as the
destination IP address.
The syslog messages will contain the IP
address the GigabitEthernet 0/1 interface.
For multiple occurrences of the same
error, only the first three messages will be
sent to the server.
34. Question
What type of installation is needed to view
syslog messages?
A syslog server must be installed on a
workstation.
A syslog client must be installed on a
workstation.
A syslog server must be installed on a
router.
Because any network equipment can
interpret syslog messages, nothing special
is needed to view them.
35. Question
Which two things should a network
administrator modify on a router to perform
password recovery? (Choose two.)
system ROM
the startup configuration file
the system image file
the configuration register value
the NVRAM file system
36. Question
What effect does the default-information
originate command have on a Cisco router
that is configured for RIP?
Any routes that are learned from a
neighboring router will propagate to other
adjacent routers.
Any static route that is learned from a
neighboring router will propagate to other
adjacent routers.
Any dynamic route that is learned from a
neighboring router will propagate to other
adjacent routers.
Any default static route that is configured
on the router will propagate to other
adjacent routers.
37. Question
What information can be verified through
the show ip dhcp binding command?
the number of IP addresses remaining in
the DHCP pool
the IPv4 addresses that have been
excluded from the DHCPv4 pool
that DHCPv4 discover messages are still
being received by the DHCP server
the IPv4 addresses that are assigned to
hosts by the DHCP server
38. Question
Refer to the exhibit. A network
administrator has added a new subnet to
the network and needs hosts on that subnet
to receive IPv4 addresses from the DHCPv4
server.
What two commands will allow hosts on the
new subnet to receive addresses from the
DHCP4 server? (Choose two.)
CCENT (ICND1) 012
R1(config)# interface G0/0
R1(config-if)# ip helper-address
10.2.0.250
R2(config)# interface G0/0
R2(config-if)# ip helper-address
10.2.0.250
R1(config-if)# ip helper-address
10.1.0.254
R1(config)# interface G0/1
39. Question
Refer to the exhibit. A network
administrator needs to add an ACE to the
TRAFFIC-CONTROL ACL that will deny IP
traffic from the subnet 172.23.16.0/20.
Which ACE will meet this requirement?
CCENT (ICND1) 011
15 deny 172.23.16.0 0.0.15.255
5 deny 172.23.16.0 0.0.15.255
30 deny 172.23.16.0 0.0.15.255
5 deny 172.23.16.0 0.0.255.255
40. Question
Which ACE would permit traffic from hosts
only on the 192.168.8.0/22 subnet?
permit 192.168.8.0 0.0.7.255
permit 192.168.0.0 0.0.15.255
permit 192.168.8.0 0.0.3.255
permit 192.168.8.0 255.255.248.0
41. Question
Refer to the exhibit. Static NAT is being
configured to allow PC 1 access to the web
server on the internal network. What two
addresses are needed in place of A and B
to complete the static NAT configuration?
(Choose two.)
CCENT (ICND1) 010
A = 209.165.201.2
A = 10.1.0.13
B = 209.165.201.1
B = 209.165.201.7
B = 10.0.254.5
42. Question
What is defined by the ip nat pool command
when configuring dynamic NAT?
the pool of global address
the range of internal IP addresses that are
translated
the pool of available NAT servers
the range of external IP addresses that
internal hosts are permitted to access
43. Question
Refer to the exhibit. When a packet arrives
on interface Serial0/0/0 on R1, with a
destination IP address of PC1, which two
events occur? (Choose two)
CCENT (ICND1) 009
Router R1 will forward the packet out
Gig0/0.
Router R1 will forward the packet out
Gig0/1.
Router R1 will forward the packet out
S0/0/0.
Router R1 will forward the packet out
Gig0/0.
Router R1 will de-encapsulate the packet
and encapsulate it in an Ethernet frame.
Router R1 will de-encapsulate the packet
and encapsulate it in a PPP frame.
44. Question
Refer to the exhibit. What would happen
after the IT administrator enters the new
static route?
CCENT (ICND1) 008
The 172.16.1.0 route learned from RIP
would be replaced with the 172.16.1.0 static
route.
The 172.16.1.0 static route would be
entered into the running-config but not
shown in the routing table.
The 0.0.0.0 default route would be
replaced with the 172.16.1.0 static route.
The 172.16.1.0 static route is added to
the existing routes in the routing table.
45. Question
Refer to the exhibit. Which static route
would an IT technician enter to create a
backup route to the 172.16.1.0 network that
is only used if the primary RIP learned route
fails?
CCENT (ICND1) 007
ip route 172.16.1.0 255.255.255.0 s0/0/0
91
ip route 172.16.1.0 255.255.255.0 s0/0/0
ip route 172.16.1.0 255.255.255.0 s0/0/0
111
ip route 172.16.1.0 255.255.255.0 s0/0/0
121
46. Question
Refer to the exhibit. How was the host route
2001:DB8:CAFE:4::1/128 installed in the
routing table?
CCENT (ICND1) 006
The route was automatically installed
when an IP address was configured on an
active interface.
The route was dynamically learned from
another router.
The route was manually entered by an
administrator.
The route was dynamically created by
router R1.
47. Question
Refer to the exhibit. What will router R1 do
with a packet that has a destination IPv6
address of 2001:db8:cafe:5::1?
CCENT (ICND1) 005
drop the packet
forward the packet out GigabitEthernet0/1
forward the packet out GigabitEthernet0/0
forward the packet out Serial0/0/0
48. Question
What is the purpose of the overload keyword in
the ip nat inside source list 1 pool
NAT_POOL overload command?
It allows many inside hosts to share one
or a few inside global addresses.
It allows a pool of inside global addresses
to be used by internal hosts.
It allows external hosts to initiate sessions
with internal hosts.
It allows a list of internal hosts to
communicate with a specific group of
external hosts.
49. Question
Refer to the exhibit. Which source address
is being used by router R1 for packets
being forwarded to the Internet?
CCENT (ICND1) 004
198.51.100.3
209.165.202.141
10.6.15.2
209.165.200.225
50. Question
Which three layers of the OSI model map to
the application layer of the TCP/IP model?
(Choose three.)
application
presentation
session
data link
transport
network
51. Question
Which address prefix range is reserved for
IPv4 multicast?
240.0.0.0 - 254.255.255.255
224.0.0.0 - 239.255.255.255
169.254.0.0 - 169.254.255.255
127.0.0.0 - 127.255.255.255
52. Question
Which IPv6 prefix is reserved for
communication between devices on the
same link?
FC00::/7
2001::/32
FE80::/10
FDFF::/7
53. Question
Which type of IPv6 address refers to any
unicast address that is assigned to multiple
hosts?
unique local
global unicast
link-local
anycast
54. Question
Refer to the exhibit. Packets destined to
which two networks will require the router
to perform a recursive lookup? (Choose
two.)
CCENT (ICND1) 003
10.0.0.0/8
64.100.0.0/16
128.107.0.0/16
172.16.40.0/24
192.168.1.0/24
192.168.2.0/24
55. Question
Refer to the exhibit. Routers R1 and R2 are
connected via a serial link. One router is
configured as the NTP master, and the
other is an NTP client. Which two pieces of
information can be obtained from the partial
output of the show ntp associations detail
command on R2? (Choose two.)
CCENT (ICND1) 002
Both routers are configured to use
NTPv2.
Router R1 is the master, and R2 is the
client.
Router R2 is the master, and R1 is the
client.
The IP address of R1 is 192.168.1.2.
The IP address of R2 is 192.168.1.2.
Finish quiz
Comments
0 comments
0 Comments
Add a comment...
Facebook Comments Plugin
Home Mobility Fundamentals Linux Essentials Introduction to Linux II C++
L1 CCNA7 PremiumExam SECFND About