Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

CLASS TEST 1

IPT

LEVEL : CCNA

Question 1
What is the range of assignable IP addresses for a subnet containing
an IP address of 172.16.1.10 /19?

a. 172.16.0.1 – 172.16.31.254
b. 172.16.0.1 – 172.16.63.254
c. 172.16.0.0 – 172.16.31.255
d. 172.16.0.1 – 172.16.31.255
e. 172.16.0.0 – 172.16.63.254

Question 2
Which of the following is a set of wiring standards that describe the
color coding of wires in RJ-45 connections?

a. CSMA/CD
b. Multimode
c. EIA/TIA 568
d. RS-232

Question 3
In the following topology, how many collision domains are
represented?

1
a. 3
b. 4
c. 5
d. 9

Question 4

2
A router resides at what layer of the TCP/IP Model?

a. Application
b. Transport
c. Internet
d. Network Interface
e. Session

Question 5
In the diagram below, Client A is sending a packet to Host 1. As the
packet is coming into the Fa 0/0 interface on router R2, what is the
source IP address in the packet’s header?

a. 10.1.1.1
b. 172.16.1.2
c. 192.16.1.1
d. 10.1.1.2
e. 172.16.1.1
f. 192.16.1.2

Question 6
In the diagram below, Client A is sending a packet to Host 1. Which
devices will make a packet forwarding decision based on a
destination IP address? (Choose 2.)

3
a. switch SW1
b. router R1
c. router R2
d. switch SW2

Question 7
Which of the following is considered to be a reliable Transport Layer
protocol?

a. IP
b. UDP
c. TCP
d. ICMP
e. PPP

Question 8
You are assigning IP addresses to hosts in the 192.168.4.0 /26
subnet. Which two of the following IP addresses are assignable IP
addresses that reside in that subnet?

a. 192.168.4.0
b. 192.168.4.63
c. 192.168.4.62
d. 192.168.4.32
e. 192.168.4.64

Question 9
Which of the following are security best practices when setting up a
Cisco router? (Choose all the apply.)

a. Enable the password encryption service.


b. Enable Telnet for remote access.
4
c. Create a welcome.
d. Use the enable password command to restrict access to the
router’s privileged mode.
e. Issue the exec-timeout 0 0 command to log out any idle
sessions.

Question 10
You are working with a Class B network with the IP address of
172.16.0.0/16. You need to maximize the number of broadcast
domains, where each broadcast domain can accommodate 1000
hosts. What subnet mask should you use?

a. /22
b. /23
c. /24
d. /25
e. /26

Question 11
Typically, HTTP uses what Transport Layer protocol and what port
number?

a. UDP port 80
b. TCP port 443
c. UDP port 443
d. TCP port 80
e. TCP port 143

Question 12
PC has just booted up and wants to communicate with a host on a
remote subnet. The PC knows the IP addresses of its default
gateway and the remote host. However, in order to properly construct
5
a frame, the PC needs an appropriate destination MAC address.
What MAC address does the PC need to learn, and what protocol will
the PC use to learn that MAC address?

a. the MAC address of the PC’s default gateway, learned via ARP
b. the MAC address of the remote host, learned via DNS
c. the MAC address of the PC’s default gateway, learned via DNS
d. the MAC address of the remote host, learned via ARP

Question 13
What is the directed broadcast address of a subnet containing an IP
address of 172.16.1.10 /19?

a. 172.16.15.255
b. 172.16.31.255
c. 172.16.255.255
d. 172.16.95.255
e. 172.16.0.255

Question 14
Consider the following topology.

6
Client F has just booted up, and its MAC address has not been
learned by switch SW1 (as seen in the output of the show mac
address-table command). If Client A sends a frame destined for
Client F’s MAC address, what will switch SW1 do with the frame?

a. SW1 will flood the frame out of all of its ports.


b. SW1 will flood the frame out of all of its ports, other than the port
on which the frame was received.
c. SW1 will drop the frame, because there is no entry for the
destination MAC address in switch SW1’s MAC address table.
d. SW1 will forward the frame out of port Gi 1/0/2 only.

Question 15
A customer is using a Class C network of 192.168.10.0 subnetted
with a 28-bit subnet mask. How many subnets can be created by
using this subnet mask?

a. 32
7
b. 16
c. 30
d. 8
e. 14

Question 16
A PC requires which of the following configuration parameters in
order to Telnet to a host on a remote subnet? (Choose 3.)

a. IP address
b. subnet mask
c. routing protocol
d. VLAN assignment
e. default gateway

Question 17
Which of the following devices can be used to interconnect broadcast
domains? (Choose 2.)

a. router
b. Ethernet hub
c. Layer 2 switch
d. Ethernet bridge
e. Layer 3 switch

Question 18
An Ethernet hub has 12 Ethernet ports. How many collision domains
and how many broadcast domains exist on the Ethernet hub?

a. 12 Collision Domains and 12 Broadcast Domains


b. 1 Collision Domain and 12 Broadcast Domains
c. 12 Collision Domains and 1 Broadcast Domain
8
d. 1 Collision Domain and 1 Broadcast Domain

Question 19
You are sitting at the privileged mode command line prompt on
RouterA, and you want to remotely connect to RouterB (which has an
IP address of 172.16.1.1). What command would you issue on
RouterA?

a. ssh 172.16.1.1
b. traceroute 172.16.1.1
c. ping 172.16.1.1
d. telnet 172.16.1.1

Question 20
You are in interface configuration mode of a Cisco router, and you
want to assign an IP address of 172.16.1.1 /24 to the interface.
Which of the following is the command you should enter?

a. Router1(config-if)# ip address 172.16.1.1 /24


b. Router1(config-if)# ip address 172.16.1.1 0.0.0.255
c. Router1(config-if)# ip address 172.16.1.1 255.255.255.0
d. Router1(config-if)# ip address 172.16.1.1 classful

Question 21

In DR and BDR election, which components of OSPF is used ?

a. Router-id

b. Hello

c. Prime

9
d. Priority

Question 22

Which of the following are Distance Vector protocols?

a. IGRP

b. RIP

c. OSFP

d. EIGRP

Question 23

What is an administrative distance of 0 mean?

a. 0 means unbelievable

b. 0 is for EIGRP

c. 0 is the default distance for directly connected networks

d. 0 means unreachable

Question 24

What three occurrences will reset the holddown timer after a


triggered update?

a. Infinity is finally defined as some max number

b. HD Timer expires

c. Another update is received indicating a better metric

d. The router receives a processing task proportional to the


10
number of links in the internetwork

e. The router detects fault LSP's propagating through the


internetwork

f. Another update is received indicating net status changed

Question 25

What is the purpose of Split Horizon?

a. It prevents the regular update messages from reinstating a


route that has gone down

b. Information received on an interface cannot be sent back out


the same interface

c. Informs all neighbor routers that two routes exist

d. Tells the router the destination is unreachable

Question 26

What is true about Link-State protocols?

a. They maintain a more complex table than distant vector


protocols

b. They maintain a less complex table than distant vector


protocols

c. They use routing ports

d. The maintain backup copies of the IOS

Question 27

11
Put the following steps of encapsulation into the correct order:

a. The data is broken into segments to be organized

b. Frames are converted to 1s and 0s to be put on the wire

c. Packets are converted into frames

d. Information that users enter is converted into data

e. The segments are changed to packets to be routed

Question 28

In OSPF, which protocol is used to discover neighbour routers


automatically?

a. Link state protocol

b. Error-correction protocol

c. Routing information protocol

d. Hello protocol

Question 29

Which of the following is not a type of OSPF packet?

a. Hello

b. Link-state request

c. Link-state response

d. Link-state ACK

12
Question 30

EIGRP metric is ________

a. K-values

b. Bandwidth only

c. Hop Count

d. Delay only

Question 31

EIGRP send the hello message after every ___________ seconds

a. 5 seconds (LAN), 60 seconds (WAN)

b. 5 seconds (LAN), 5 seconds (WAN)

c. 15s

d. 180s

Question 32

In EIGRP best path is known as the successor, where as backup


path is known as __________

a. Feasible successor

b. Back-up route

c. Default route

d. There is no backup route in EIGRP

13
Question 33

An OSPF router receives an LSA, the router checks its sequence


number, and this number matches the sequence number of the LSA
that the receiving router already has.

What does the receiving router do with the LSA?

a. Ignores the LSA

b. Adds it to the database

c. Sends newer LSU update to source router

d. Floods the LSA to the other routers

Question 34

The outcome of Dijkstra’s calculation is used to populate the


__________

a. Topology table

b. Routing table

c. Neighbor table

d. Adjacency table

Question 35

DBD packets are involved during which two states?

a. Exstart

b. Loading

c. Exchange

14
d. Two-way

GOOG LUCK

15

You might also like