Skip to main content

CCNA EXAM

Question: 1

Refer to the exhibit. What is the effect of the configuration that is shown?

A. It configures the virtual terminal lines with the password 030752180500.
B. It configures a Cisco network device to use the SSH protocol on incoming
communications via the virtual terminal ports.
C. It allows seven failed login attempts before the VTY lines are temporarily shutdown.
D. It configures SSH globally for all logins.
E. It tells the router or switch to try to establish an SSh connection first and if that fails to use
Telnet.

Answer: B

Explanation:
Secure Shell (SSH) is a protocol which provides a secure remote access connection to
network devices. Communication between the client and server is encrypted in both SSH
version 1 and SSH version 2. If you want to prevent non-SSH connections, add the
“transport input ssh” command under the lines to limit the router to SSH connections only.
Straight (non-SSH) Telnets are refused.
Reference: www.cisco.com/warp/public/707/ssh.shtml

Question: 2

Refer to the exhibit. What kind of cable should be used to make each connection that is
identified by the numbers shown?



A. 1 - Ethernet straight-through cable
2 - Ethernet crossover cable
3 - serial cable
4 - Ethernet straight-through cable
B. 1 - Ethernet rollover cable
2 - Ethernet crossover cable
3 - serial cable
4 - null modem cable
C. 1 - Ethernet straight-through cable
2 - Ethernet crossover cable
3 - serial cable
4 - rollover cable
D. 1 - Ethernet crossover cable
2 - Ethernet straight-through cable
3 - fiber optic cable
4 - rollover cable
E. 1 - Ethernet straight-through cable
2 - Ethernet straight-through cable
3 - serial cable
4 - rollover cable

Answer: E

Explanation:
When connecting other devices to a switch, such as a router or workstations, a straight
through cable is used. The only exception to this rule is when you are connecting another
switch to a switch, in which case a cross over cable should be used.
For a serial connection to another router or to a WAN, a serial cable should be used. Finally,
when connecting directly to the console port of a Cisco device, a rollover cable should be
used. This cable is also commonly referred to as a console cable.

Question: 3

You work as a network technician in a Company. Please study the exhibit carefully.


The router console screen is rapidly displaying line after line of output similar to what is
shown in the exhibit. The help desk has called to say that users are reporting a slowdown in
the network. What will solve this problem while not interrupting network operation?

A. Press the CTRL+C keys.
B. Save the configuration and reboot the router.
C. Enter the no debug all command.
D. Use the show processes command.

Answer: C

Explanation:
The output shown in this example is a result of one or more debug commands that have been
used to troubleshoot an issue. Using debug commands might slow down traffic on busy
networks. To see the current debug command settings, enter the show debug command. To
stop the debug output, enter the no debug command. To stop all debug messages from being
displayed, enter the no debug all command.

Question: 4




Please study the exhibit shown above carefully, and answer the following questions.
A static map to the S-AMER location is required. Which command should be used to create
this map?

A. frame-relay map ip 172.30.0.3 702 broadcast
B. frame-relay map ip 172.30.0.3 196 broadcast
C. frame-relay map ip 172.30.0.3 344 broadcast
D. frame-relay map ip 172.30.0.3 704 broadcast

Answer: B

Explanation:
Based on the output of the command "show frame-relay map", we know that DLCI mapped
to the router S-AMER is 196. (.3 In the above network topology, the complete layer3 IP
address is172.30.0.3)
Frame-relay map: The mapping command "Frame-relay map" can statically create a mapping
reaching the remote protocol address.
The format is :
frame-relay map protocol protocol-address dlci [ broadcast ][ ietf | cisco ]
Configuring a static Frame Relay map is optional unless you are using subinterfaces. The
Frame Relay map will map a Layer 3 address to a local DLCI. This step is optional because
inverse-arp will automatically perform this map for you.
Syntax for frame-relay map is:
frame-relay map protocol address dlci [broadcast] [cisco | ietf]
The broadcast option allows packets, such as RIP updates to be forwarded across the PVC. If
you are not using the broadcast option, you need to specify the neighbor to forward unicast
packet using neighbor command.
neighbor a.b.c.d
Specify RIP neighbor. When a neighbor doesn't understand multicast, this command is used
to specify neighbors. In some cases, not all routers will be able to understand multicasting,
where packets are sent to a network or a group of addresses. In a situation where a neighbor
cannot process multicast packets, it is necessary to establish a direct link between routers.
The neighbor command allows the network administrator to specify a router as a RIP
neighbor. The no neighbor a.b.c.d command will disable the RIP neighbor.

Question: 5

You have finished physically installing an access point on the ceiling at your office. At a
minimum, which parameter must be configured on the access point in order to allow a
wireless client to operate on it?

A. SSID
B. AES
C. TKIP
D. PSK

Answer: A

Explanation:
SSID (Service Set Identifier) can also be written as ESSID, which is used to distinguish
different networks. It has 32 characters at most, WLAN cards set up different SSID to enter
different networks. SSID is usually broadcast by AP or wireless routers , you can view SSID
of the present area through XP built-in scanning feature .Taking security into consideration,
SSID can be not broadcast, meanwhile users need to set up SSID manually to enter the
appropriate network. Simply speaking, SSID is the name of a local area network, only those
computers that set up the same SSID value can communicate with each other.

Question: 6

Which is the correct fallback sequence for loading the Cisco IOS?

A. Flash, TFTP server, ROM
B. ROM, Flash, NVRAM
C. Flash, NVRAM, RAM
D. ROM, TFTP server, Flash

Answer: A

Explanation:
By default, a Cisco IOS router will normally boot up from flash where the IOS is stored. If
the IOS in not found or has become corrupted, the router will then send an all hosts broadcast
(255.255.255.255) to find a TFTP server to download the IOS from. Should that fail, the
router will boot up in ROM Monitor mode as a last resort.

Question: 7

Which tables of EIGRP route information are held in RAM and maintained through the use of
hello and update packets? (Choose two.)

A. RTP table
B. SPF table
C. query table
D. neighbor table
E. DUAL table
F. topology table

Answer: D,F

Explanation:
Only the neighbor table and the topology table of EIGRP route information are held in RAM
and maintained through the use of hello and update packets.

Question: 8

Refer to the exhibit. Complete this network diagram by dragging the correct device name of
description name or description to the correct location. Not all the names or descriptions will
be used.


Answer:

Question: 9

Refer to the exhibit. Why are two OSPF designated routers identified on Core_Router?


A. The DR election is still underway and there are two contenders for the role.
B. The router at 208.149.23.130 is a secondary DR in case the primary fails.
C. Core_Router is connected to more than one multiaccess network.
D. Two router IDs have the same OSPF priority and are therefore tied for DR election.

Answer: C

Explanation:
OSPF neighbors process multicast hello packets upon multicast address 224.0.0.5 to find
neighbors dynamically. Default hello packets sending interval is 10 seconds, and dead
interval is 40 seconds. In multi-access broadcasting network (such as Ethernet Net and Token
Ring), DR/BDR elections are needed. When electing DR/BDR, hello packets priority is
considered, the highest priority is DR, then BDR. Default priority is 1. In the circumstances
when Priority is the same, RID will be considered, the highest rating RID is DR, and then
BDR. When you set the priority 0, OSPF router can not become DR/BDR, it will only turn
into DROTHER. From the above OSPF neighbors table, we learn that Ethernet1 and
Ethernet0 select DR correspondingly, and Core_Router is connected two multi-access
networks.

Question: 10

As a CCNA candidate, you will be expected to know the POST process very well. A Cisco
router is booting and has just completed the POST process. It is now ready to find and load an
IOS image. What function does the router perform next?

A. It inspects the configuration file in NVRAM for boot instructions.
B. It attempts to boot from a TFTP server.
C. It loads the first image file in flash memory.
D. It checks the configuration register.

Answer: D

Explanation:
This question tests how a Cisco router is started.
Step 1 The router is booting.
Step 2 The router completes the POST process.
Step 3 The router finds and loads an IOS image.
Step 4 The router checks the configuration register and decides how to load start
configuration based on the value of the configuration register.

Question: 11

Two routers named Atlanta and Brevard are connected by their serial interfaces as shown in
the exhibit, but there is no data connectivity between them. The Atlanta router is known to
have a correct configuration. Given the partial configurations shown in the exhibit, what is
the problem on the Brevard router that is causing the lack of connectivity?



A. The serial line encapsulations are incompatible.
B. The subnet mask is incorrect.
C. The bandwidth setting is incompatible with the connected interface.
D. The maximum transmission unit (MTU) size is too large.
E. The IP address is incorrect.
F. A loopback is not set.

Answer: E

Explanation:
The IP address of the S0 interface of Atlanta is 192.168.10.0/24, and the IP address of the S1
interface of Breavard is 192.168.11.0/24. Change the IP address of the S1 interface to
192.168.10.0/24, the same as that of the S0 interface.

Question: 12

R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a
MAC as the frame carrying this packet leaves the s0/0/0 interface of R1?


A. The frame does not have MAC addresses.
B. The destination MAC address in the frame is the MAC address of the s0/0/0 interface of
R2
C. The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.
D. The destination MAC address in the frame is the MAC address of the NIC of server 1.
E. The source MAC address in the frame is the MAC address of the NIC of Host 1.

Answer: A

Explanation:
The frame relay network does not have hardware addresses.

Question: 13

Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized
access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be
the only computers with access to the Payroll Server. What two technologies should be
implemented to help prevent unauthorized access to the server? (Choose two.)


A. STP
B. access lists
C. VTP
D. VLANs
E. wireless LANs
F. encrypted router passwords

Answer: B,D

Explanation:
Group these workstations into the same VLAN and use access control lists to set the access
authority of the VLAN.

Question: 14

Which PPP authentication methods will you use when configuring PPP on an interface of a
Cisco router?(Choose two)

A. PAP
B. SSL
C. CHAP
D. SLIP

Answer: A,C

Explanation:
Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol
(CHAP) authenticate the endpoints on either end of a point-to-point serial link. Chap is the
preferred method today because the identifying codes flowing over the link are created using
a MD5 one-way hash, which is more secure that the clear-text passwords sent by PAP.
Reference:
CCNA Self-Study CCNA ICND exam certification Guide (Cisco Press, ISBN 1-58720-083-
X) Page 314
PPP has two ways to authenticate : one is PAP, the other is CHAP. PAP is less secure than
CHAP. PAP transmits the password in the form of plaintext, while the transmission process
of CHAP does not contain password, using hash to replace password. The PAP authentication
can be achieved by two-way handshake ,while the CHAP authentication can be achieved by
three-way handshake. The PAP authentication is that the dialed sends the request and the dial
reply, while the CHAP authentication is that the dial send request and the dialed sends back a
data packet which contains the random hash value sent by the dial, after confirming the
database has no error, the dial will send a successfully connected packet to connect.

Question: 15

Refer to the graphic. A network associate is planning to copy a new IOS image into the
router. This new image requires 8 MB of flash memory and 32 MB of RAM. How will the
IOS proceed with the copy process?
Exhibit #sow flash:


A. The new IOS will be copied into flash memory and the current image will remain.
B. IOS will issue an error message because flash memory is not large enough to hold the new

Comments

Popular posts from this blog

OSI Model in Networking in Urdu , Computer Networking tutorial 17 lecture

OSI Model in Networking in Hindi Urdu p1, Computer Networking tutorial 17 lectur. Developed by representatives of major computer and telecommunication companies beginning in 1983, OSI was originally intended to be a detailed specification of actual interfaces. Instead, the committee decided to establish a common reference model for which others could then develop detailed interfaces, which in turn could become standards. OSI was officially adopted as an international standard by the International Organization of Standards (ISO). The seven Open Systems Interconnection layers are: Layer 7: The application layer .         This is the layer at which communication partners are identified (Is there someone to talk to?), network capacity is assessed (Will the network let me talk to them right now?), and that creates a thing to send or opens the thing received.     Layer 6: The presentation layer.           In this layer is usually part of an operating system (OS) and con

Basic Network

Topologies

Think of a topology as a network's virtual shape or structure. This shape does not necessarily correspond to the actual physical layout of the devices on the network. For example, the computers on a home LAN may be arranged in a circle in a family room, but it would be highly unlikely to find a ring topology there. Network topologies are categorized into the following basic types: bus ring star tree mesh More complex networks can be built as hybrids of two or more of the above basic topologies. Bus Topology Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Ring Topology In a