Top CCNA Questions

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 31

Top 100 CCNA Questions

1) What is Routing?
Routing is the process of finding a path on which data can pass from source to
destination. Routing is done by a device called routers, which are network layer devices.
2) What is the purpose of the Data Link?
The job of the Data Link layer is to check messages are sent to the right device. Another
function of this layer is framing.
3) What is the key advantage of using switches?
When a switch receives a signal, it creates a frame out of the bits that was extracted
from that signal. With this process, it gains access and reads the destination address,
after which it forwards that frame to the appropriate port. This is a very efficient means
of data transmission, instead of broadcasting it on all ports.
4) When does network congestion occur?
Network congestion occurs when too many users are trying to use the same bandwidth.
This is especially true in big networks that do not resort to network segmentation.
5) What are three types of LAN traffic?
Ans. Unicasts - intended for one host.
Broadcasts - intended for everyone.
Multicasts - intended for a only a subset or group within an entire network.
6) What are unicast frames?
Ans. Unicast frames are the most common type of network traffic. A unicast frame is a
frame intended for only one host. The only station that processes this frame is one
station that has its own MAC address in the destination portion of packet.
7) How do you enable IGRP on a Cisco router?
Ans. The way you enable IGRP on a Cisco router is similar to the way you enable RIP,
except you specify IGRP as the protocol and add an autonomous system number. For
example:
RouterA(config)# router igrp 10 (10 is the AS number)
RouterA(config-router)# network 192.168.0.0
RouterA(config-router)# network 192.168.1.0
RouterA(config-router)# network 192.168.2.0

8) What is Interior Gateway Routing Protocol (IGRP)?


Ans. IGRP is a Cisco proprietary distance vector routing protocol. IGRP has a default
hop count of 100 hops, with a maximum hop count of 255. IGRP uses bandwidth and
line delay as its default metric, but it can also use reliability, load, and MTU.
9) What is the destination address of broadcast frames?
Ans. The destination address of broadcast frames (Layer 2 broadcast addresses) is FFFF-FF-FF-FF-FF, or all 1s in binary.
10) What is the difference between bridges and switches?
Ans. Bridges and switches function the same way; the only difference is in how they are
implemented. Bridges are implemented by software and usually have a couple of
network ports. Switches are implemented in hardware by ASIC chips and have many
ports.
11) Does a bridge divide a network into smaller segments?
Not really. What a bridge actually does is to take the large network and filter it, without
changing the size of the network.
12) Which LAN switching method is used in CISCO Catalyst 5000?
This model uses the Store-and-forward switching method. It stores the entire frame to
its buffers and performs a crc check before deciding whether or not to forward that data
frame.
13 ) What is the role of the LLC sublayer?
The LLC sublayer, short for Logical Link Control, can provide optional services to an
application developer. One option is to provide flow control to the Network layer by
using stop/start codes. The LLC can also provide error correction.
14) How does RIP differ from IGRP?
RIP relies on the number of hops in order to determine the best route to a network. On
the other hand, IGRP takes consideration many factors before it decides the best route
to take, such as bandwidth, reliability, MTU and hop count.
15) What are the different memories used in a CISCO router?
NVRAM stores the startup configuration file
DRAM stores the configuration file that is being executed
Flash Memory stores the Cisco IOS.

16) What is BootP?


BootP is a protocol that is used to boot diskless workstations that are connected to the
network. It is short for Boot Program. Diskless workstations also use BootP in order to
determine its own IP address as well as the IP address of the server PC.
17) What is the function of the Application Layer in networking?
The Application Layer supports the communication components of an application and
provides network services to application processes that span beyond the OSI reference
model specifications. It also synchonizes applications on the server and client.
18) What is the Spanning-Tree Protocol (STP)?
Ans. STP is a loop-prevention bridge-to-bridge protocol. Its main purpose is to
dynamically maintain a loop-free network. It does this by sending out Bridge Protocol
Data Units (BPDUs), discovering any loops in the topology, and blocking one or more
redundant links.
19) In spanning tree, what is a Bridge ID (BID)?
Ans. A BID is an 8-byte field that is composed of the bridge's 6-byte MAC address and a
2-byte bridge priority.
20) What is the default bridge priority in a Bridge ID for all Cisco switches?
32,768
21) In.In spanning tree, what is path cost?
Ans. Path cost is a calculation to determine the link's bandwidth. It is a value assigned
to each port that is based on the port's speed.
22) How do bridges pass spanning tree information between themselves?
Ans. Bridges pass STP information using special frame called Bridge Protocol Data
Units (BPDUs).
23) How often do bridges send BPDUs out active ports?
The default time that bridges send BPDUs out active ports is 2 seconds.
Note: All ports on a switch listen for BPDUs in case there is a topology change.
24) What is the STP blocking state?

Ans. When a switch starts, all ports are in the blocking state. This is to prevent any
loops in the network. If there is a better path to the root bridge, the port remains in the
blocked state. Ports in the blocked state cannot send or receive traffic, but they can
receive BPDUs.
25) Differentiate User Mode from Privileged Mode
User Mode is used for regular task when using a CISCO router, such as to view system
information, connecting to remote devices, and checking the status of the router. On the
other hand, privileged mode includes all options that are available for User Mode, plus
more. You can use this mode in order to make configurations on the router, including
making tests and debugging.
26) What is 100BaseFX?
This is Ethernet that makes use of fiber optic cable as the main transmission medium.
The 100 stands for 100Mbps, which is the data speed.
27) Differentiate full-duplex from half-duplex.
In full-duplex, both the transmitting device and the receiving device can communicate
simultaneously, that is, both can be transmitting and receiving at the same time. In the
case of half-duplex, a device cannot receive while it is transmitting, and vice versa.
28) What is MTU?
MTU stands for Maximum Transmission Unit. It refers to the maximum packet size that
can be sent out onto the data line without the need to fragment it.
29) How does cut-through LAN switching work?
In Cut-Through LAN switching, as soon as the router receives the data frame, it will
immediately send it out again and forward it to the next network segment after reading
the destination address.
30) What is latency?
Latency is the amount of time delay that measures the point from which a network
device receives a data frame to the time it sends it out again towards another network
segment.
31) Utilizing RIP, what is the limit when it comes to number of hops?
The maximum limit is 15 hop counts. Anything higher than 15 indicates that the network
is considered unreachable.

32) What is a Frame Relay?


Frame Relay is a WAN protocol that provides connection-oriented communication by
creating and maintaining virtual circuits. It has a high performance rating and operates
at the Data Link and Physical Layers.
33) How do you configure a Cisco router to route IPX?
The initial thing to do is to enable IPX routing by using the ipx routing command. Each
interface that is used in the IPX network is then configured with a network number and
encapsulation method.
34) What are the different IPX access lists?
There are two access lists: Standard and Extended. Standard Access List can only filter
the source or destination IP address. An Extended Access List uses the source and
destination IP addresses, port, socket and protocol when filtering a network.
35) Explain the benefits of VLANs.
VLANs allow the creation of collision domains by groups other than just physical
location. Using VLANs, it is possible to establish networks by different means, such as
by function, type of hardware, protocol, among others. This is a big advantage when
compared to conventional LANs wherein collision domains are always tied to physical
location.
36) What is subnetting?
Subnetting is the process of creating smaller networks from a big parent network. Being
a part of a network, each subnet is assigned some additional parameters or identifier to
indicate its subnet number.
37) What is the STP listening state?
Ans. Ports transition from a blocked state to a listening state. In this state, no user data
is passed. The port only listens for BPDUs. After listening for 15 seconds (if the bridge
does not find a better path), the port moves to the next state, the learning state.
38) What is the STP learning state?
Ans. In the STP learning state, no user data is being passed. The port quietly builds its
bridging table. The default time in the learning state is 15 seconds.
39) What is the STP forwarding state?

Ans. After the default time in the learning state is up, the port moves to the forwarding
state. In the forwarding state, the port sends and receives data.
40) What is STP forward delay?
Ans. The forward delay is the time it takes for a port to move from the listening state to
the learning state or from the learning state to the forwarding state. The default time is
30 seconds.
41) What is the hello time in STP timers?
Ans. The hello time is the time interval between the sending of BPDUs. The default time
is 2 seconds.
42) What is the Max Age timer?
Ans.The Max Age timer is how long a bridge stores a BPDU before discarding it. The
default time is 20 seconds (ten missed hello intervals).
43) What is the default time a port takes to transition from the blocking state to the
forwarding state?
Ans.The default time a port takes to transition from the blocking state to the forwarding
state is 50 seconds: 20 seconds for Max Age, 15 seconds for listening, and 15 seconds
for learning.
44) What are the advantages of a layered model in the networking industry?
A layered network offers many advantages. It allows administrators to make changes in
one layer without the need to make changes in the other layers. Specialization is
encouraged, allowing the network industry to make progress faster. A layered model
also lets administrators troubleshoot problems more efficiently.
45) Why is UDP lease favored when compared to TCP?
Its because UDP is unreliable and unsequenced. It is not capable of establishing virtual
circuits and acknowledgements.
46) What are some standards supported by the Presentation layer?
Presentation layer supports many standards, which ensures that data is presented
correctly. These include PICT, TIFF and JPEG for graphics, MIDI, MPEG and
QuickTime for Video/Audio.
47) Whats the simplest way to remotely configure a router?

In cases when you need to configure a router remotely, the most convenient is to use
the Cisco AutoInstall Procedure. However, the router must be connected to the WAN or
LAN through one of the interfaces.
48) What does the show protocol display?
routed protocols that is configured on the router
the address assigned on each interface
the encapsulation method that was configured on each interface
49) How do you depict an IP address?
It can be done in three possible ways:
using Dotted-decimal. For example: 192.168.0.1
using Binary. For example: 10000010.00111011.01110010.01110011
using Hexadecimal. For example: 82 1E 10 A1
50) How do you go to privileged mode? How do you switch back to user mode?
To access privileged mode, you enter the command enable on the prompt. In order to
get back to user mode, enter the command disable
51) What is HDLC?
HDLC is short for High Level Data Link Control protocol, and is a propriety protocol of
CISCO. It is the default encapsulation operated within CISCO routers.
52) How are internetworks created?
Internetworks are created when networks are connected using routers. Specifically, the
network administrator assigns a logical address to every network that connects to
the router.
53) What is Bandwidth?
Bandwidth refers to the transmission capacity of a medium. It is a measure of how much
volume a transmission channel can handle, and is measured in Kbps.
54) How does Hold-downs work?
Hold-downs prevent regular update messages from reinstating a downed link by
removing that link from update messages. It uses triggered updates to reset the holddown timer.
55) What are packets?

Packets are the results of data encapsulation. These are data that has been wrapped
under the different protocols of the OSI layers. Packets are also referred to as
datagrams.
56) What are segments?
Segments are sections of a data stream that comes from the upper OSI layers and
ready for transmission towards the network. Segments are the logic units at the
Transport Layer.
57) Give some benefits of LAN switching.
allows full duplex data transmission and reception
media rate adaption
easy and efficient migration
58) What is Route Poisoning?
Route Poisoning is the process of inserting a table entry of 16 to a route, making it
unreachable. This technique is used in order to prevent problems caused by
inconsistent updates on a route.
59) How do you find valid hosts in a subnet?
The best way to go about this is to use the equation 256 minus the subnet mask. The
hosts that are considered valid are those that can be found between the subnets.
60) What does STP do when it detects a topology change in the network due to a bridge
or link failure?
Ans. If spanning tree detects a change in the network due to a bridge or link failure, at
least one bridge interface changes from the blocking state to the forwarding state, or
vice versa.
61) Describe the central office (CO)?
Ans. The CO is the telco switching facility that connects the customer to the
provider's switching network. The CO is sometimes referred to as a point of presence. It
is the point where the local loop gains access to the service provider's access lines.
62) What is the toll network?
Ans. All the telco switches, COs, and trunk lines inside the WAN provider's network are
the toll network.
63) What are synchronous links?

Ans. Synchronous links have identical frequencies and contain individual characters
encapsulated in control bits, called start/stop bits that designate the beginning and end
of each character. Synchronous links try to use the same speed as the other end of a
serial link.
64) What are Asynchronous links?
Ans. Asynchronous links send digital signals without timing. Asynchronous links agree
on the same speed, but there is no check or adjustment of the rates if they are slightly
different. Only 1 byte per transfer is sent.
65) What are the three layers of the Cisco Hierarchical Model?
Ans. The three layers of the Cisco Hierarchical Model are: 1
the access layer
The distribution layer
The core layer
66) How do you enable IGRP on a Cisco router?
Ans. The way you enable IGRP on a Cisco router is similar to the way you enable RIP,
except you specify IGRP as the protocol and add an autonomous system number. For
example:
RouterA(config)# router igrp 10 (10 is the AS number)
RouterA(config-router)# network 192.168.0.0
RouterA(config-router)# network 192.168.1.0
RouterA(config-router)# network 192.168.2.0
67) What is flow control, and what are the three methods of implementing it?
Ans. Flow control is the method of controlling the rate at which a computer sends data,
thus preventing network congestion. The three methods of implementing flow control
are
Buffering
Congestion avoidance
Windowing
Almost certain to be on the exam.
68) The IEEE defines what two sublayers of the data link layer?
Ans.The two sublayers of the data link layer are
The Logical Link Control (LLC) sublayer
The Media Access Control (MAC) sublayer
These two sublayers provide physical media independence.

69) What are some network devices that operate at the data link layer?
Ans. Bridges and switches are network devices that operate at the data link layer. Both
devices filter traffic by MAC addresses.
70) Brielfly explain the conversion steps in data encapsulation.
From a data transmitters point of reference, data from the end user is converted to
segments. Segments are then passed on to the other layers and converted into packets
or datagrams. These packets are then converted into frames before passing on to the
network interface. Finally, frames are converted to bits prior to actual data transmission.
71) What are the different types of passwords used in securing a CISCO router?
There are actually five types of passwords that can be used. These are enable secret,
enable, virtual terminal, console, and auxiliary.
72) Why is network segmentation a good idea when managing a large network?
For a network administration, segmenting a network would help ease network traffic and
ensures that high bandwidth is made available at all times for all users. This translates
to better performance especially for a growing network.
73) Differentiate Logical Topology from Physical Topology
Logical Topology refers to the signal path through the physical topology. Physical
Topology is the actual layout of the network medium.
74) What causes a triggered update to reset the router hold-down timer?
This may happen when the hold-down timer has already expired, or when
the router received a processing task that incidentally was proportional to the number of
links in the internetwork.
75) In configuring a router, what command must be used if you want to delete the
configuration data that is stored in the NVRAM?
A. erase running-config
B. erase startup-config
C. erase nvram
D. delete nvram
Correct Answer: B. erase startup-config
76) Referring to the commands shown, what command must next be used on the
branch router prior to traffic being sent to the router ?

Hostname: Branch Hostname: Remote


PH# 123-6000, 123-6001 PH# 123-8000, 123-8001
SPID1: 32055512360001 SPID1: 32055512380001
SPID2: 32055512360002 SPID2: 32055512380002
isdn switch-type basic ni
username Remote password cisco
interface bri0
ip address 10.1.1.1 255.255.255.0
encapsulation ppp
ppp authentication chap
isdn spid1 41055512360001
isdn spid2 41055512360002
dialer map ip 10.1.1.2 name Remote 1238001
dialer-list 1 protocol ip permit
Correct Answer: (config-if)# dialer-group 1
77) When configuring a router utilizing both physical and logical interfaces, what factor
must be considered in determining the OSPF router ID?
A. The highest IP address of any physical interface.
B. The lowest IP address of any logical interface.
C. The middle IP address of any logical interface..
D. The lowest IP address of any physical interface.
E. The highest IP address of any interface.
F. The highest IP address of any logical interface.
G. The lowest IP address of any interface.
Correct Answer: A. The highest IP address of any physical interface.
78) Mention what is the size of IP address?
Size of IP address is 32 bit for IPv4 and 128 bit for IPv6.
79) Mention what does data packets consist of?
A data packet consists of senders information, recipients information, and the data
contained. It also has the numeric identification number that defines the packet number
and order. When data is send across the network, that information is segmented into
data packets. In short, data packets carry the information and routing configuration for
your transferred message.
80) Mention what is DHCP?

DHCP stands for Dynamic Host Configuration Protocol. DHCP assigns an IP address
automatically to a given workstation client. You can also make static IPS for machines
like printers, servers, routers and scanners.
81) Mention what is BOOTP?
BOOTP is a computer networking protocol used to deploy an IP address to network
devices from a configuration server.
82) Explain why is UDP lease favored when compared to TCP?
It is because UDP is un-sequenced and unreliable. It is not capable of creating virtual
circuits and acknowledgments
83) Mention what is the difference between dynamic IP and static IP addressing?
Dynamically IP addresses are provided by DHCP server and static IP address are given
manually.
84) Mention what are the ranges for the private IPS?
Ranges for private IPS are
Class A: 10.0.0.0 10.0.0.255
Class B: 172.16.0.0 172.31.0.0
Class C: 192.168.0.0 192.168.0.255
85) In how many ways you can access router?
You can access it in three ways
Telnet (IP)
AUX (Telephone)
Console (Cable)
86) Explain what is EIGRP?
EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing
protocol designed by Cisco Systems. It is availed on a router to share routes with
other routers within the same autonomous system. Unlike
other routers like RIP,EIGRP only sends incremental updates, decreasing the workload
on the router and the amount of data that needs to be transferred.
87) Mention what is the matric of EIGRP protocol?
EIGRP protocol consists of

Bandwidth
Load
Delay
Reliability
MTU
Maximum Transmission Unit
88) Mention what does the clock rate do?
Clockrate enables the routers or DCE equipment to communicate properly.
89) Mention what command you must use if you want to delete or remove the
configuration data that is stored in the NVRAM?
Erase startup- coding is the command you must use if you want to delete the
configuration data that is stored in the NVRAM.
90) Explain the difference between half-duplex and full-duplex?
Full duplex means that the communication can occur in both directions at the same
time, while half duplex means that the communication can occur in one direction at time.
91)Mention the conversion steps of data encapsulation?
Conversion steps of data encapsulation includes
Layer one, two and Three ( Application/presentation/session) : Alphanumeric input from
the user is converted into Data
Layer Four (Transport): Data is converted into small segments
Layer Five (Network): Data converted into packets or datagrams and Network header is
added
Layer Six (Data Link): Datagrams or packets are built into frames
Layer Seven (Physical): Frames are converted into bits
92) What command do we give if router IOS is stucked?
Cntrl+Shift+F6 and X is the command we give if router IOS is stucked.
93)Explain what is route poisoning?
Route poisoning is a technique of preventing a network from transmitting packets
through a route that has become invalid.
94) What route entry will be assigned to dead or invalid route in case of RIP?

In the case of RIP table entry 16 hops will be assigned to dead or invalid route making it
unreachable.
95) What are broadcast domains?
Ans. A broadcast domain defines a group of devices that receive each others' broadcast
messages. As with collisions, the more broadcasts that occur on the network, the slower
your network will be. This is because every device that receives a broadcast must
process it to see if the broadcast is intended for it.
96) What is the difference between a routing protocol and a routed protocol?
Ans. Routing protocols determine how to route traffic to the best location of a routed
protocol. Examples of routing protocolsare RIP, EIGRP, OSFP, and BGP. Examples of
routed protocols are IP and IPX.
97) What 3 devices are used to segment a LAN?
Ans. Router
Switch
Bridge
98) In how many ways you can access router?
You can access it in three ways
Telnet (IP)
AUX (Telephone)
Console (Cable)
99) Explain what is EIGRP?
EIGRP stands for Enhanced Interior Gateway Routing Protocol; it is a routing
protocol designed by Cisco Systems. It is availed on a router to share routes with
other routers within the same autonomous system. Unlike
other routers like RIP,EIGRP only sends incremental updates, decreasing the workload
on the router and the amount of data that needs to be transferred.
100) Mention what is the matric of EIGRP protocol?
EIGRP protocol consists of
Bandwidth
Load
Delay
Reliability

MTU
Maximum Transmission Unit

CCNA Questions Part-3 ( Questions 106-150)

106.What is the administrative distance used for in static routes?


A: To rate the sources trustworthiness
107.Static routes are used for which of the following?
A: Defining a path to an IP destination network.
Building routing tables to remote networks.
108.What is the command syntax to set a gateway of last resort in your Cisco router?
A: ip route 0.0.0.0 0.0.0.0 <gateway address>

109.Which Cisco IOS command can you use to see the routing table?
A: sh ip route or sh ipx route
110.You need two subnets with 35 users each. Which subnet mask would you use on
your class C
network address to accomplish this?
A: 255.255.255.192
111.You have 8 stations connected to separate 10 Mbps ports on a layer 2 switch. How
many Mbps
of bandwidth will each port have?
A: 10
112.Which protocol will send a message to routers if a network outage or congestion
occurs?
A: ICMP
113.Which protocol is used to manage and monitor the network?
A: SNMP
114.Which frame has a TYPE field to identify the upper-layer protocol?
A: Ethernet_II
115.When should you use static routing instead of dynamic routing?
A: When you have only a few routers and want to save bandwidth.
116.What is the command for creating an IP static route?
A: ip route <destination_network_address> < subnet_mask> < default_gateway>
117.When looking at a routing table, what does the S identifier mean?
A: Statically connected
118.What is true about IP routing?
A: A device will send a frame with the hardware destination or the default gateway. The
router will
strip the frame and put the datagram in a new frame with the new remote destination
address.
119.What static route parameter will tell a router the name of the interface to use to get
to a destination
network?

A: interface
120.When creating a static route, what is the gateway parameter used for?
A: Defining the next hop.
121.What is true when creating static routes?
A: Gateway is required, the administrative distance is optional.
122.When looking at a routing table, what does the C identifier mean?
A: Directly Connected
123.Which command enables directly connected network 194.45.37.0 to be used by
RIP?
A: Router(config-router)# network 194.45.37.0
124.What is the routing algorithm used by RIP?
A: Distance Vector
125.What is the routing metric used by RIP?
A: Hop count
126.What is the routing algorithm used by IGRP?
A: Distance Vector
127.Which command can you type at the router prompt to verify the broadcast
frequency for IGRP?
A: sh ip protocol
128.Which utility will identify the path that a packet takes as it travels to its final
destination?
A: Trace
129.What are the routing metrics used by IGRP?
A: Bandwidth, reliability, MTU, delay, and load. IGRP can also use hop counts to
determine the best
route to a remote network.
130.What does a metric of 16 hops represent in a RIP routing network?
A: Destination is unreachable
131.Which commands should you use to enable IGRP routing?

A: router igrp 101


network 192.168.1.0
network 10.0.0.0
132.What routing technique prevents the router from sending info through the same
interface from
which it was originally received?
A: Split Horizon
133.On a frame relay interface Serial 0, what subinterface numbers would you use?
A: 1 and 2
134.What are the three types of routes that IGRP advertises?
A: Interior, system and exterior routes.
135.Which of the following are distance-vector protocols?
A: RIP and IGRP
136.Which of the following routing protocols use Autonomous Systems?
A: IGRP, EIGRP, OSPF & NLSP
137.Each department has its own file server and the company has an enterprise server
that is shared
by all departments. What would you use to provide secure separation between two
different departments?
A: routers to provide the most secure segmentation.
138.What is true about link-state networks?
A: They maintain a more complex table than distance-vector based networks.
139.What is convergence?
A: The speed and ability of a group of internetwork devices running a specific protocol
to agree on
the topology after a change takes place.
140.What type of routing protocols send their entire routing table every 30 seconds?
A: Distance-vector
141.What is the default administrative distance of RIP?
A: 120

142.What is the default administrative distance for IGRP?


A: 100
143.You just received an output that states the CDP hold time, hardware, port ID, and
local interface
of a remote router. What was the command did you enter?
A: show cdp neighbor
144.Whats the default CDP hold time?
A: 180 seconds
145.What's the default CDP update broadcast rate?
A: 60 seconds

146.What frame type does CDP use to gather information about its directly connected
neighbors?
A: SNAP
147.Which command can you type to view the hostnames configured in your router
(Choose two)?
A: show hosts
sh host
148.How would you configure it so you could type in the hostname Randy instead of
the IP address
to access the remote router named Randy?
A: Router(config)# ip host randy <ip_address>
149.If you type copy tftp flash, what will happen?
A: You copy a file from TFTP server to router flash.
150.What command will allow you to load a Cisco router configuration that is stored on
a TFTP
server into working RAM?
A: config net <ip address of TFTP server>

41. How do you change the Enable Secret password to CCNA?


A: Router(config)# enable secret CCNA
42. How many access-lists are possible on an interface per protocol?
A: There can be only one access list for in and one for out on each interface per
protocol.
43. What happens to a packet which is not permitted in the access list?
A: There is an implicit deny any at the end of an access list. So if the packet is not
explicitly permitted,
it will be dropped.
44. Which command is used to view what access-lists are on serial0 interface?
A: show interface serial0
45. Which show interface serial 1 status statement indicates that the shutdown
command has been
issued?
A: Serial 1 is administratively down, the line protocol is down.
46. What are the access-list ranges for IP (standard and extended)?
A: 1-99 IP standard access list
100-199 IP extended access list
47. What does the command cdp timer 120 do?
A: Changes the cdp update time to 120 seconds?
48. Which of the following are the frame-relay LMI types used in Cisco routers?
A: Cisco (Default)
ANSI
Q933a
49. What is LMI?
A: Management information that tells current DLCI values, global or local significance,
and the
status of virtual circuits.
50. What commands could you enter to monitor Frame-relay activity on Cisco routers?
A: show interface s0
show frame-relay map

51. You have network 145.100.0.0 with a subnet mask of 255.255.248.0. If an access
list is applied to
address 145.100.8.0 with a wildcard mask of 0.0.7.255, what address range will it filter?
A: Just the 145.100.8.0 subnet
52. What are the 2 steps used to configure and access list?
A: Define the list using access-list command.
Enable an interface using the access-group command.
53. What does the ipx maximum paths command do?
A: Allows you to forward IPX packets over multiple paths to improve load sharing.
54. Which of the following protocols are used to get an IP address from a known MAC
address?
A: RARP Reverse Address Resolution Protocol.
55. You have an IP address of 153.50.6.27 and a subnet mask of 255.255.255.128.
What is the class,
how many bits are being subnetted, and what is the broadcast address?
A: Class B, 9 bits, 153.50.6.127
56. How do you display the ipx routing updates in or out between routers?
A: sh ipx traffic
57. How do you enable IPX on a router?
A: ipx routing, int e0, IPX network 77790, encapsulation arpa
58. How do you display your configured DLCIs on a frame-relay router?
A: sh frame-relay pvc
59. A Unique ID placed in the header of each frame as it travels the switch fabric with a
userassigned
ID defined in each frame is known as?
A: Frame tagging
60. Which OSI layer is responsible for putting 1s and 0s into a logical group?
A: Data Link
61. Which OSI layer is responsible for addressing devices and routing through an
internetwork?
A: Network

62. Which layer is responsible for flow control, acknowledgment, and windowing?
A: Transport
63. What is the result of segmenting a network with a router into 2 segments?
A: It prevents one segments broadcasts from getting to the other segment.
64. Which layer is responsible for coordinating communication between systems?
A: Session
65. Which layer is responsible for negotiating data transfer syntax?
A: Presentation
66. Which layer is responsible for synchronizing sending and receiving applications,
identifying and
establishing the availability of the intended communication partner, and determining if
sufficient
resources for the intended communication exists?
A: Application
67. CPE is an acronym for what?
A: Customer Premises Equipment

68. Which 2 statements are true about IP addressing?


A: A host portion of all 1s indicates a network broadcast
IP addresses are four octets long and contain a network and a host portion.
69. CSU/DSU is an acronym for which of the following?
A: Channel Service Unit - device that connects end-user equipment to the local digital
telephone
loop.
Data Service Unit - used to adapt the physical interface on a DTE device to a circuit like
T1. DSU
does the signal timing as well.
70. Which IP host address range is allowable given an IP address of 169.73.3.55 using
12 bits of subnetting?
A: 169.73.3.49 through 169.73.3.62
71. CO is an acronym for which of the following?

A: Central office
72. What is cut-through switching?
A: Packet switching where data is exiting the switch at the same time it is still entering
the inbound
port.
73. Given an IP host address of 169.61.3.151 and a subnet mask of 255.255.255.192,
which subnet
does this host belong to?
A: 169.61.3.128
74. What does the Spanning-Tree Algorithm (STA) do?
A: Implemented by STP to prevent loops by creating a spanning tree.
75. Of the different switching types, which one has the lowest latency?
A: Cut-Through
76. Of the different switching types, which one has the highest latency?
A: Store-and-Forward
77. To specify all hosts in the class B IP network 172.16.0.0, which wildcard access list
mask would
you use?
A: 0.0.255.255
78. IP extended access lists use what parameters as a basis for permitting or denying
packets?
A: Source Address
Destination Address
Port Number
Protocol
79. How would you specify only to check host 172.16.30.65 in an IP access list?
A: 172.16.30.65 0.0.0.0, or host 172.16.30.65
80. How many valid host IP addresses are available on the following subnetwork?
167.21.41.17/30
A: 2
81. What is the port number used by TCP?

A: 6
82. What is the port number used by UDP?
A: 17
83. What does the acronym ARP stand for?
A: Address Resolution Protocol
84. Which protocol derives a hardware address from a known IP address?
A: ARP
85. Which protocol works at the Internet layer of the DOD model and is responsible for
making
routing decisions?
A: IP
86. Which port numbers are used by TCP and UDP to set up sessions with other hosts?
A: 1023 and above
87. The User Datagram Protocol works at which layer of the DOD model?
A: Host-to-Host.
88. Which protocol sends redirects back to an originating router?
A: Internet Control Message Protocol - ICMP
89. Ping uses which Internet layer protocol?
A: ICMP
90. What does the following command do?
Router(config)# router igrp 101
A: Identifies IGRP as the routing protocol on autonomous system 101.
91. Which protocols use the Transport layer?
A: TCP, UDP, and SPX.
92. Which of the following is a connectionless protocol that uses the Transport layer?
A: UDP
93. Which protocol is used for booting diskless workstations?
A: Bootstrap Protocol

94. What command do you use to change your enable password?


A: Router(config)# enable password <password>
95. What command can you use to copy the configuration from NVRAM into running
RAM?
A: copy startup-config running-config, or copy start run
96. What is the syntax for changing the name of a Cisco router?
A: Hostname <routername>
97. To exit from privileged mode and go back to the user mode, what would you type at
the privileged
mode prompt?
A: disable
98. Given the following description of OSI layers, choose the correct order that these
statements are
listed in?
1) This layer segments and reassembles data into a data stream.
2) This layer manages device addressing, tracks the location of devices, and
determines best
path.
3) This layer provides the physical transmission of the data and handles error
notification
and flow control.
A: Transport, network, data link
99. What is the auxiliary (AUX) port used for?
A: Modem connections for a console, or a dialup connection for temporary Dial on
Demand Routing
(DDR)
100.How do you enable the advanced editing features?
A: terminal editing
101.What keys do you use to view, from history, the last command that was entered into
a Cisco
router?
A: CTRL+P
102.What key do you press to have the Cisco IOS finish typing a command for you?

A: TAB
103.What does the erase startup-config command do?
A: Erases the startup-configuration from NVRAM
104.What is the command to set the clock rate on your DCE interfaces to 64 Kbps?
A: clock rate 64000 (not clockrate)
105.If you have two Cisco routers connected with DTE/DCE cables, to which router
would you add
the command clock rate?
A: DCE

CCNA Questions Part-1

1. What is the Network ID for the IP address 192.168.12.6, assuming default subnet
mask?
A: 192.168.12.0
2. What is the Node ID for the IP address 192.168.12.6, assuming default subnet mask?
A: 0.0.0.6
3. What is the Network ID for the IPX address 2c.0000.0c56.de34?
A: 2c
4. What is the Node ID for the IPX address 2c.0000.0c56.de34?
A: 0000.0c56.de34
5. In what order do the five steps of Data Encapsulation take place?
A: 1) User information is converted to data.
2) Data is converted to segments.
3) Segments are converted to packets or datagrams.
4) Packets or datagrams are converted to frames.
5) Frames are converted to bits.
6. What kind of services are provided by the Presentation layer?
A: PICT, JPEG, MIDI, MPEG, ASCII and EBCDIC
7. What kind of services are provided by the Session layer?
A: NFS, SQL, RPC and NetBIOS
8. How do you enable a Banner on a Cisco Router?
A: Router(Config)# banner motd #
9. Which three protocols are correctly matched to their respective transport layer
function?
A: TCP = connection oriented
TCP = three way handshake
UDP = no sequence and acknowledgment
10. What are the two ways to display IPX address information on interface Ethernet1?
A: show ipx interface Ethernet1
show interface Ethernet1
11. Which IP-class provides the fewest numbers of Hosts?

A: Class C
12. How do you change the Console password on a router to be sharon?
A: Router(config)# line con 0
Router(config-line)# login
Router(config-line)# password sharon

13. How are the ISDN protocols defined?


A: I - stands for concepts, terminology and services
E - stands for existing telephone network
Q - stands for switching and signaling
14. Your are configuring RIP on your router. What happens when you enter the
command
Router(config-router)# network 175.76.3.0?
A: RIP has been enabled on the 175.76.3.0 network.
15. What is the command to show both source and destination addresses for IPX?
A: debug IPX routing activity
16. How do you log into User EXEC mode?
A: Press enter and enter userid and the password if necessary.
17. What command instructs the router to load the IOS from Read Only Memory ?
A: boot system rom
18. What is the Frame Relay configuration command for the second subinterface?
A: interface s0.2 point-to-point
19. What is the command level where you enter the access list command?
A: Router(config)#
20. How are routing loops prevented? (Choose four)
A: Route Poisoning
Hold downs
Split horizon
Triggered Updates
21. What's the default subnet mask for a Class A IP address?
A: 255.0.0.0

22. What's the default subnet mask for a Class B IP address?


A: 255.255.0.0
23. What's the default subnet mask for a Class C IP address?
A: 255.255.255.0
24. Troy Technologies has an employee that is working at home. This employee runs
big client
server applications and must quickly transfer large files. What solution would be the
most cost
effective?
A: Install an ISDN connection at the employees house.

25. What is half duplexing?


A: Frames feed into a single cable in one direction at a time.
26. What are the three main methods of flow control?
A: Windowing
Buffering
Source Quench Messaging
27. What are the correct encapsulation types for frame-relay?
A: Cisco & Ietf
28. In IOS editing mode, how do you return to the beginning of command line?
A: Ctrl + a
29. What type of WAN protocol uses PVCs?
A: Frame Relay
30. Given the following IP address: 162.53.21.12
You plan for no more than 126 hosts on the subnet that includes this address. What
subnet mask
would you use?
A: 255.255.255.128

31. How would you backup the IOS image to a TFTP server?

A: copy flash tftp


32. What command would you use to get totally out of config mode and return to PRIV
mode on the
router?
A: ctrl + z
33. How does "Store-and-Forward" LAN switching method work?
A: Switch waits for the whole frame before forwarding.
Latency varies with different frame sizes.
34. You have a class B IP address with a 12 bit subnet. How many subnets and hosts
are available?
A: 4094 subnets, 14 hosts
35. You have the following access list command:
access-list 800 permit 3d 4a
You also have the following interface configurations:
interface Ethernet 0
ipx network 4a
ipx access-group 800 out
interface Ethernet 1
ipx network 3d
interface Ethernet 2
ipx network 5c
Which two statements are true?
A: Traffic from network 3d for network 4a will be forwarded our e0.
The access list is applied to an outgoing interface and filters outbound traffic

36. Match the IPX Frame Type with the correct IOS encapsulation?
A: IPX Frame Type Cisco Encapsulation Type
Ethernet_802.3 Novell-ether (Default)
Ethernet_802.2 Sap
Ethernet_II Arpa
Ethernet_Snap Snap

Token Ring Sap (Default)


Token Ring_Snap Snap
Fddi_Snap Snap (Default)
Fddi_802.3 Sap
Fddi_Raw Novell-fddi
HDLC HDLC (Default)
37. Router configuration can be done by what four methods?
A: Memory (NVRAM)
Terminal (Console)
Network (TFTP)
Overwrite
38. To make a router boot from a file called FRED on the TFTP server at IP address
171.59.117.19,
which command should be entered?
A: Router(config)# boot system TFTP fred 171.59.117.19
39. How do you change the Auxiliary password to Cisco?
A: Router(config)# line aux 0
Router(config-line)# login
Router(config-line)# password Cisco
40. How do you change the Virtual Terminal password to CCIE?
A: Router(config)# line vty 0 4
Router(config-line)# login
Router(config-line)# password CCIE

You might also like