Professional Documents
Culture Documents
1000 CCNA Certification Exam Preparation Questions and Answers: One Thousand Practice Questions For Passing The CCNA Exams
1000 CCNA Certification Exam Preparation Questions and Answers: One Thousand Practice Questions For Passing The CCNA Exams
Certification Exam
Preparation Questions
and Answers:
One Thousand
Practice Questions
for Passing the CCNA
Exams -
Pass On Your
First Try
1
Copyright © 2009
Notice of rights
Notice of Liability
The information in this book is distributed on an “As Is” basis
without warranty. While every precaution has been taken in the
preparation of the book, neither the author nor the publisher shall
have any liability to any person or entity with respect to any loss
or damage caused or alleged to be caused directly or indirectly
by the instructions contained in this book or by the products
described in it.
Trademarks
2
This self-study exam preparation guide for the CCNA exams
contains everything you need to test yourself and pass the Exam.
Can you imagine valuing a book so much that you send the
author a “Thank You” letter?
This book provides a laser sharp focus on all the exam objectives
with a cohesive, concise, yet comprehensive coverage of all the
topics included in the CCNA Exams.
3
CCNA Practice exam Questions D. show ipx nodes.
4
ipx network 9e ipx ethernet 0.1
interface ethernet 0.2 ipx encapsulation novell-ether
ipx encapsulation sap ipx network 9e
ipx network 6c interface ethernet 0.2
ipx encapsulation sap
Ans D ipx network 6c
The following commands setup the subinterfaces to
allow for two types of encapsulation: 8 By default, Cisco routers forward GNS SAPs to
interface ethernet 0.1 remote networks.
ipx encapsulation Novell-ether
ipx network 9e A. False
interface ethernet 0.2 B. True
ipx encapsulation sap
ipx network 6c Ans A
GNS is Novell’s protocol to Get Nearest Server.
7 What does the “IPX maximum-paths 2” command If there is a server on the local network, that server
accomplish? will
respond. If there isn’t, the Cisco router has to be
A. It enables load sharing on 2 paths if the paths configured to forward the GNS SAP.
are equal metric paths.
B. It sets up routing to go to network 2. 9 To prevent Service Advertisements (SAPs) from
C. It is the default for Cisco IPX load sharing. flooding a network, Cisco routers do not forward
D. It enables load sharing on 2 paths if the paths them. How are services advertised to other
are unequal metric paths. networks?
Ans A A. Each router builds its own SAP table and forwards
It enables load sharing on 2 paths if the paths are that every 60 seconds.
equal metric paths. The default is 1 path and the B. Each router assigns a service number and
maximum is 512 paths. broadcasts that.
C. SAPs aren’t necessary with Cisco routers.
8 You want to enable both arpa and snap D. Cisco routers filter out all SAPs.
encapsulation on one router interface. How do you
do this? Ans: A
Cisco routers build SAP tables and forward the table
A. The interface can handle multiple encapsulation every 60 seconds. All SAPs can’t be filtered even
types with no extra configuration. with 4.x since NDS and time synchronization uses
B. Assign two network numbers, one for each SAPs.
encapsulation type.
C. Enable Novell-ether to run multiple encapsulation 10 Novell’s implementation of RIP updates routing
types. tables every ____ seconds.
D. Both arpa and snap are enabled by default so
you don’t have to configure anything. A. 60
B. 90
Ans B C. 10
To assign multiple network numbers, you usually D. 30
use subinterfaces. A sample configuration follows:
5
Ans A Token-Ring, and Novell’s FDDI_802.2. Cisco uses
Novell’s RIP updates routing tables every 60 snap for
seconds, Apple’s RTMP is every 10 seconds, routers Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP.
ARP every 60 seconds, IGRP signal every 90 Cisco uses
seconds, arpa for Ethernet_II and, finally the default is
and Banyan VINES signals every 90 seconds. Novell-ether for Novell’s Ethernet_802.3.
11 In Novell’s use of RIP, there are two metrics used 14 “snap” is used by the Cisco IOS for which
to make encapsulation
routing decisions. Select the two metrics. types?
A. Ethernet_SNAP
A. Ticks. B. Token-Ring_SNAP
B. Hops C. FDDI_SNAP
C. Loops D. Novell-SNAP
D. Counts E. Novell-FDDI.
Ans A A. Ethernet_802.2
B. Token-Ring
13 “arpa” is used by the Cisco IOS for which C. FDDI_SNAP
encapsulation D. Ethernet_802.3
types? E. FDDI_802.2
6
arpa for Ethernet_II and, finally the default is B. NetWare 4.11 defaults to 802.3 encapsulation
Novell-ether for Novell’s Ethernet_802.3. C. Cisco routers only work with NetWare 3.11.
D. NetWare 3.11 defaults to 802.2 encapsulation.
16 Which type of Ethernet framing is used for TCP/
IP and Ans A
AppleTalk? The default encapsulation on Cisco routers is
Novell Ethernet_802.3 and NetWare 3.12 and later
A. Ethernet 802.3 defaults to
B. Ethernet 802.2 802.2 encapsulation, 3.11 and earlier defaults to
C. Ethernet II 802.3.
D. Ethernet SNAP
19 NetWare IPX addressing uses a network number
Ans D and a node
Ethernet 802.3 is used with NetWare versions 2 number. Which statements are true?
through 3.11, Ethernet 802.2 is used with NetWare
3.12 and A. The network address is administratively assigned
later plus OSI routing, Ethernet II is used with TCP/ and can
IP and be up to 16 hexadecimal digits long.
DECnet, and Ethernet SNAP is used with TCP/IP and B. The node address is always administratively
AppleTalk. assigned.
C. The node address is usually the MAC address.
17 Which type of Ethernet framing is used for TCP/ D. If the MAC address is used as the node address,
IP and then IPX
DECnet? eliminates the use of ARP.
7
Ans A 23 What does the following series of commands
IPX (Internetwork Packet Exchange) is a NetWare accomplish?
network layer 3 protocol used for transferring
information router igrp 71
on LANs. network 10.0.0.0
router igrp 109
21Which NetWare protocol provides link-state network 172.68.7.0
routing?
A. It isolates networks 10.0.0.0 and 172.68.7.0.
A. NLSP B. It loads igrp for networks 109 and 71.
B. RIP C. It disables RIP.
C. SAP D. It disables all routing protocols.
D. NCP
Ans A
Ans: A It isolates network 10.0.0.0 and 172.68.7.0 and
associates autonomous systems 109 and 71 with
NetWare Link Services Protocol (NLSP) provides IGRP. IGRP
link-state routing. SAP (Service Advertisement does not disable RIP, both can be used at the same
Protocol) time.
advertises network services. NCP (NetWare Core
Protocol) 24 In the command “router igrp 109” what does
provides client-to-server connections and 109 signify?
applications. RIP
is a distance vector routing protocol. A. an autonomous system
B. any network number which the router is attached
22 As a system administrator, you want to debug to
igrp but are C. the allowable length of the routing table
worried that the “debug IP igrp transaction” D. the network socket number
command will
flood the console. What is the command that you Ans A
should The Cisco IOS global configuration command
use? “router igrp xxx” is used to configure the Interior
Gateway Routing Protocol. In this case, the 109 is
A. debug IP igrp event called the process-id , which can also be used for an
B. debug IP igrp-events autonomous system number.
C. debug IP igrp summary
D. debug IP igrp events 25 IGRP supports a feature that allows traffic to be
distributed among up to 6 (4 default) paths to
Ans D provide
The “debug IP igrp events” is used to only greater overall throughput and reliability. What is
display a summary of IGRP routing information. this
You can called?
append an IP address onto either command to see
only the A. unequal-cost load balancing
IGRP updates from a neighbor. B. equal-cost load balancing
8
C. proportionate load balancing
D. low cost load balancing A. 30
B. 10
Ans A C. 60
An unequal-cost load balancing is used to D. 90
provide alternate paths for data distribution on an
internetwork. Cisco developed this method to use Ans: A
unused or Novell’s RIP updates routing tables every 60
under utilized links to increase bandwidth and seconds, Apple’s RTMP is every 10 seconds, routers
network ARP every
availability. 60 seconds, DECnet hosts and IGRP signal every 15
seconds,
26 IGRP uses flash updates, poison reverse updates, and Banyan VINES signals every 90 seconds.
holddown
times, and split horizon. How often does it 29 An autonomous system can only exist if all
broadcast its routers in that
routing table updates? system meet which criteria?
A. 90 seconds A. interconnected
B. 10 seconds B. run the same routing protocol
C. 30 seconds C. assigned same autonomous system number
D. 45 seconds D. run IGRP only
E. run RIP only
Ans A
Ans A,B &C
27 The command “show IP protocol” displays which An autonomous system is a set of routers and
information? networks under the same administration. Each
router must be
A. routing timers interconnected, run the same routing protocol, and
B. network information assigned
C. contents of the IP routing table the same autonomous system number. The network
D. information about all known network and Information
subnetworks Center (NIC) assigns a unique autonomous system
number to
Ans A & B enterprises.
9
gateway. It is used to reduce the length of routing the privileged EXEC prompt. As part of the display,
tables you see
and to provide complete routing capabilities when “Set DF bit in IP header? [yes] :” What would
a router happen if you
might not know the routes to all other networks. answered no at the prompt.
31 Routers can learn about destinations through A. This lets the router fragment the packet.
static routes, B. It tells the router not to fragment the packet.
default, or dynamic routing. By default, a router C. This lets the router direct the packet to the
will use destination
information derived from __________. it finds in its routing table.
D. It tell the router to send the packet to the next
A. IGRP hop
B. RIP router.
C. IP
D. TCP Ans A
“Set DF bit in IP header?” is a response to an
Ans A extended ping at the router. If you answer yes (the
The quality of information is rated: default)
Connected interface 0 the router will not fragment the packet. If you
Static route 1 answer no,
IGRP 100 the router will fragment the packet.
RIP 120
Unknown 255
The lower the value, the more reliable the source 34 You have typed “ping” 172.16.101.1 and get the
with 255 following display:
signifying information that the router will ignore. Type escape sequence to abort.
So, the Sending 5, 100-byte ICMP Echoes to 172.16.101.1,
router will use IGRP, rated at 100, before RIP, rated timeout is 2 seconds:
at .!!!!
120. What does the “.” signify?
A. That one message timed out.
32 You are logged into a router, what command B. That all messages were successful.
would C. That one message was successful.
show you the IP addresses of routers connected to D. That one message completed in under the
you? allotted
timeframe.
A. show cdp neighbors detail
B. show run Ans A
C. show neighbors The possible responses from the ping command are:
D. show cdp
! Successful receipt of an echo reply.
Ans A . Timed out waiting for a reply
U Destination unreachable
33 As a system administrator, you perform an C Congestion-experienced packet
extended ping at I Ping interrupted
10
? Packet type unknown A. 6
& Packet TTL exceeded B. 1
C. 2
35 Which command, that is used to test address D. 4
configuration,
uses Time-To-Live (TTL) values to generate messages Ans A
from You can only specify six name servers in one
each router. command. The syntax is “IP name-server server-
address1 [[
A. trace server-address2 ]...server-address6]. You must also
B. ping enable
C. telnet DNS.
D. bootp
38 How would you configure one host name that
Ans: A points to two IP
The Cisco IOS EXEC command “trace [protocol] addresses?
[destination]” is used to discover routes that
packets will A. IP host jacob 1.0.0.5 2.0.0.8
travel to their destination hosts. Trace uses TTL B. IP jacob 1.0.0.5 2.0.0.8
(Time to C. IP host jacob 1.0.0.5
Live) values to report destination route information. D. IP host duplicate “all”
11
Ans A & B
Router#term IP netmask-format { bitcount | 43 You are given the following address:
decimal | hexadecimal } and Router(config-if)#IP 15.16.193.6/21.
netmask-format { bitcount | decimal | Determine the subnet mask, address class, subnet
hexadecimal } are address,
correct. You can configure the mask for the current and broadcast address.
session
and you can configure it for a specific line. A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255
B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255
C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0
40 When configuring the subnet mask for an IP D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255
address, which
formats can be used?A. dotted-decimal. Ans A
12
have 14 subnets. The formula is (2 to the power of
A. 254 n)-2.
B. 510 By borrowing 4 bits, you have (2x2x2x2)-2=14. By
C. 126 borrowing
D. 16,372 5 bits, you have (2x2x2x2x2)-2=30. To get 20
subnets, you
Ans A would need to borrow 5 bits so the subnet mask
172.16.2 120 is a standard Class B address with would be
a subnet mask that allows 254 hosts. 255.255.255.248.
You are a network administrator and have been
assigned the 48 You are given the IP address of 172.16.2.160
IP address of 201.222.5.0. You need to have 20 with a subnet
subnets with mask of 255.255.0.0. What is the network address
5 hosts per subnet. The subnet mask is in binary?
255.255.255.248.
A. 10101100 00010000
46 Which addresses are valid host addresses? B. 00000010 10100000
C. 10101100 00000000
A. 201.222.5.17 D. 11100000 11110000
B. 201.222.5.18
C. 201.222.5.16 Ans: A
D. 201.222.5.19 To find the network address, convert the IP
E. 201.222.5.31 address to binary--10101100 000100000 00000010
10100000--then ANDed it with the subnet mask--
Ans A,B & D 11111111
Subnet addresses in this situation are all in 11111111 00000000 00000000. The rest is 10101100
multiples of 8. In this example, 201.222.5.16 is the 00010000
subnet, 201.22.5.31 is the broadcast address. The 00000000 00000000, which is 172.16.0.0 in
rest are decimal.
valid host IDs on subnet 201.222.5.16. The first octet rule states that the class of an address
can
47 You are a network administrator and have been be determined by the numerical value of the first
assigned the octet.
IP address of 201.222.5.0. You need to have 20
subnets with 49 Which addresses are INCORRECTLY paired with
5 hosts per subnet. What subnet mask will you use? their class?
13
240 to 255, Class E. C. Class B addresses include 128.0.0.0 through
The first octet rule states that the class of an address 191.255.0.0
can D. Class C addresses include 192.0.0.0 through
be determined by the numerical value of the first 223.255.255.0
octet. E. Class D addresses include 224.0.0.0 through
239.255.255.0
50 Which addresses are INCORRECTLY paired with
their class? Ans A
Class A addresses include 1.0.0.0 through
A. 1 to 126, Class A 126.0.0.0
B. 128 to 191, Class A Class B addresses include 128.0.0.0 through
C. 1 to 126, Class B 191.255.0.0
D. 128 to 191, Class B Class C addresses include 192.0.0.0 through
223.255.255.0
Ans:B & C. Class D addresses include 224.0.0.0 through
Address classes are: 1 to 126, Class A; 128 to 239.255.255.0
191, Class B, 192 to 223, Class C; 224 to 239, Class
D; and 53 Which IP Address Class can have 16 million
240 to 255, Class E. subnets but
The first octet rule states that the class of an address support 254 hosts?
can
be determined by the numerical value of the first A. Class C
octet. B. Class A
C. Class B
51 Which addresses are INCORRECTLY paired with D. Class D
their class?
Ans A
A. 240 - 255, Class D Possible Subnets IP Address Class Possible Hosts
B. 240 - 255, Class E 254 A 16M.
C. 224 - 239, Class D 64K B 64K
D. 224 - 239, Class E 16M C 254
14
16M C 254 Quench, Redirect, Echo, Echo Reply, Timestamp,
Information
55 There are two processes to pair MAC address Request, Information Reply, Address Request, and
with IP Address
addresses. Which process finds an IP address from Reply?
a MAC
address? A. ICMP
B. UDP
A. RARP C. TCP
B. ARP D. TFTP
C. RIP E. FTP
D. IGRP
Ans A
Ans A ICMP (Internet Control Message Protocol) is a
ARP (Address Resolution Protocol) maps an IP network layer internet protocol described in RFC #
address to the MAC address, RARP (Reverse Address 792.
Resolution ICMP reports IP packet information such as
Protocol) maps the MAC address to the IP address. destination
ARP and Unreachable, Time Exceeded, Parameter Problem,
RARP work at the internet layer of the Internet Source
Model or the Quench, Redirect, Echo, Echo Reply, Timestamp,
network layer of the OSI model. Information
Request, Information Reply, Address Request, and
56 When the router runs out of buffer space, this Address
is called Reply.
________.
58 Two of the protocols that can be carried in the
A. Source Quench Protocol
B. Redirect field of an IP packet are?
C. Information Request
D. Low Memory A. TCP
B. UDP
Ans A C. FTP
Source quench is the process where the D. TFTP
destination router, or end internetworking device
will Ans A & B
“quench” the date from the “source”, or the source The following are the fields in an IP segment,
router. their length, and their definitions:
This usually happens when the destination router VERS (Version number - 16 bits)
runs out of HLEN (Number of 32-bit words in the header - 4
buffer space to process packets. bits)
Type of Server (How the datagram should be
57 Which protocol carries messages such as handled - 32 bits)
destination Total Length (Total length of header and data - 32
Unreachable, Time Exceeded, Parameter Problem, bits)
Source Identification (Provide fragmentation of datagrams
15
to allow different MTUs in the internet - 6 bits)
different MTUs in the internet - 4 bits) TTL (Time-To-Live - 6 bits)
Flags (Provide fragmentation of datagrams to allow Protocol (Upperlayer protocol sending the datagram
different - 16 bits)
MTUs in the internet - 4 bits) Header Checksum )Integrity check on the header -
Frag Offset (Provide fragmentation of datagrams 16 bits)
to allow Source IP Address (32 bits)
different MTUs in the internet - 6 bits) Destination IP Address (32 bits)
TTL (Time-To-Live - 6 bits) IP Options (network testing, debugging, security
Protocol (Upperlayer protocol sending the datagram and others
- 16 bits) - 4 bits)
Header Checksum )Integrity check on the header - Data (4 bits).
16 bits)
Source IP Address (32 bits) 60 What field tells the Internet layer how to handle
Destination IP Address (32 bits) an IP packet?
IP Options (network testing, debugging, security
and others A. Type of Service
- 4 bits) B. Identification
Data (4 bits). C. Flags
D. Frag Offset
59 Where would network testing be included in an
IP packet? Ans A
The following are the fields in an IP segment,
A. IP Options field their length, and their definitions:
B. Identification field VERS (Version number - 16 bits)
C. Type of Service field HLEN (Number of 32-bit words in the header - 4
D. Reservation field bits)
Type of Server (How the datagram should be
Ans A handled - 32 bits)
The following are the fields in an IP segment, Total Length (Total length of header and data - 32
their length, and their definitions: bits)
VERS (Version number - 16 bits) Identification (Provide fragmentation of datagrams
HLEN (Number of 32-bit words in the header - 4 to allow
bits) different MTUs in the internet - 4 bits)
Type of Server (How the datagram should be Flags (Provide fragmentation of datagrams to allow
handled - 32 bits) different
Total Length (Total length of header and data - 32 MTUs in the internet - 4 bits)
bits) Frag Offset (Provide fragmentation of datagrams
Identification (Provide fragmentation of datagrams to allow
to allow different MTUs in the internet - 6 bits)
different MTUs in the internet - 4 bits) TTL (Time-To-Live - 6 bits)
Flags (Provide fragmentation of datagrams to allow Protocol (Upperlayer protocol sending the datagram
different - 16 bits)
MTUs in the internet - 4 bits) Header Checksum )Integrity check on the header -
Frag Offset (Provide fragmentation of datagrams 16 bits)
to allow Source IP Address (32 bits)
16
Destination IP Address (32 bits)
IP Options (network testing, debugging, security 62 Which processes does TCP, but not UDP, use?
and others
- 4 bits) A. Windowing
Data (4 bits). B. Acknowledgements
C. Source Port
61 Which fields of an IP packet provide for D. Destination Port
fragmentation of
datagrams to allow differing MTUs in the internet? Ans A & B
UDP (User Datagram Protocol) does not use
A. Identification sequence or acknowledgement fields in
B. Flags transmission.
C. Frag Offset
D. Type of Service UDP is a connectionless and unreliable protocol,
E. Total Length since there
is no delivery checking mechanism in the UDP data
Ans A, B & C format.
The following are the fields in an IP segment,
their length, and their definitions: 63 What is the UDP datagram format?
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 A. Source Port - 16 bits, Destination Port - 16 bits,
bits) Length
Type of Server (How the datagram should be - 16 Bits, Checksum - 16 bits, Data
handled - 32 bits) B. Destination Port - 16 bits, Source Port - 16 bits,
Total Length (Total length of header and data - 32 Length
bits) - 16 Bits, Checksum - 16 bits, Data
Identification (Provide fragmentation of datagrams C. Source Port - 16 bits, Destination Port - 16 bits,
to allow Checksum - 16 Bits, Length - 16 bits, Data
different MTUs in the internet - 4 bits) D. Source Port - 8 bits, Destination Port - 8 bits,
Flags (Provide fragmentation of datagrams to allow Length -8
different Bits, Checksum - 8 bits, Data
MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams Ans A
to allow The UDP format for a segment is as follows:
different MTUs in the internet - 6 bits) Source Port 16 bits
TTL (Time-To-Live - 6 bits) Destination Port 16 bits
Protocol (Upperlayer protocol sending the datagram Length 16 bits
- 16 bits) Checksum 16 bits
Header Checksum )Integrity check on the header - Data xx bits
16 bits)
Source IP Address (32 bits) 64 What is the function of DDR on Cisco routers?
Destination IP Address (32 bits)
IP Options (network testing, debugging, security A. DDR is dial--on-demand routing. It provides a
and others continuous LAN only connection.
- 4 bits) B. DDR is dial-on-demand routing. It provides
Data (4 bits). routing for high volume traffic.
17