0

CCNA Practice Test - 49

Description: CCNA Practice Test - 49
Number of Questions: 19
Created by:
Tags: CCNA Practice Test - 49 CCNA
Attempted 0/18 Correct 0 Score 0

What happens to the member ports of a VLAN when the VLAN is deleted?

  1. The ports cannot communicate with other ports.

  2. The ports default back to the management VLAN.

  3. The ports automatically become a part of VLAN1.

  4. The ports remain a part of that VLAN until the switch is rebooted. They then become members of the management VLAN.


Correct Option: A

Which statement is true regarding routing protocols?

  1. RIP uses hop count and bandwidth as the metric for path selection and sendsupdates periodically.

  2. OSPF is a Cisco proprietary protocol that sends updates triggered by topology changes.

  3. EIGRP uses DUAL to calculate the shortest path and can be configured to do unequal cost load balancing.

  4. BGP is a path vector interior routing protocol.


Correct Option: C

What is an advantage of packet-switched technology over circuit-switched technology?

  1. Packet-switched networks are less susceptible to jitter than circuit-switched networks are.

  2. Packet-switched networks can efficiently use multiple routes inside a service provider network.

  3. Packet-switched networks do not require an expensive permanent connection to each endpoint.

  4. Packet-switched networks usually experience lower latency than circuit-switched networks experience.


Correct Option: B

Refer to the exhibit. A network engineer is summarizing the two groups of routes on router R1 shown in the exhibit. Which summarization will work for all the subnets?

  1. 192.168.0.0/23

  2. 192.168.0.0/22

  3. 192.168.0.0/21

  4. 192.168.0.0/20


Correct Option: C

Refer to the exhibit. The network administrator wants to minimize the number of entries in Router1's routing table. What should the administrator implement on the network?

  1. VLSM

  2. CIDR

  3. Private IP addresses

  4. Classful routing


Correct Option: B

Refer to the exhibit. All routers have been configured with the interface priorities that are shown. All routers were restarted simultaneously. The results of the DR/BDR election are shown. What can be concluded about this network?

  1. Router C cannot win a DR election under any circumstances.

  2. If the link for interface 192.168.1.4 goes down, router B will become the new DR.

  3. The highest router ID was most likely determined via an OSPF router-id statement or statements.

  4. If a new router is added with a higher router ID than router D, it will become the DR.


Correct Option: C

Refer to the exhibit. This is the debug output from 2 directly connected EIGRP routers. They are not forming an adjacency. What is the cause?

  1. One router is a non-cisco router

  2. They have different autonomous-system numbers

  3. They are using difference sequence numbers

  4. They are sending incorrect hello types


Correct Option: B

Which parameter is used to uniquely identify one wireless network from another?

  1. SSID

  2. OFDM

  3. WEP

  4. DSSS


Correct Option: A

Why is flow control used for TCP data transfer?

  1. To synchronize equipment speed for sent data

  2. To synchronize and order sequence numbers so data is sent in complete numerical order

  3. To prevent the receiver from being overwhelmed by incoming data

  4. To synchronize window size on the server

  5. To simplify data transfer to multiple hosts


Correct Option: C

Which of the following statements describes the bounded updates used by EIGRP?

  1. Bounded updates are sent to all routers within an autonomous system.

  2. Partial updates are sent only to routers that need the information.

  3. The updates are sent to all routers in the routing table.

  4. Updates are bounded by the routers in the topology table.


Correct Option: B

In a WLAN network, why should wireless access points be implemented with each access point using a different channel?

  1. To keep users segregated on separate subnets

  2. To control the amount of bandwidth that is utilized

  3. To keep signals from interfering with each other

  4. To keep traffic secure


Correct Option: C

Which hierarchical design model layer controls the flow of network traffic using policies and delineates broadcast domains by performing routing functions between virtual LANs (VLANs)?

  1. Application

  2. Access

  3. Distribution

  4. Network

  5. Core


Correct Option: C

At which TCP/IP model layer does Internet Protocol reside?

  1. Network

  2. Internet

  3. Network Interface

  4. Data Link


Correct Option: B
Explanation:

Internet Protocol resides at theĀ Internet Layer of the TCP/IP Model

Refer to the exhibit. What can be concluded about the function of the Serial 0/0/0 interface on the router after the commands are entered?

  1. All username and password information that is sent will be encrypted.

  2. All authentication on the serial link will be accomplished using a two-way handshake.

  3. The Predictor algorithm will be used to compress all packets that are sent and received on the serial link.

  4. The serial link will be closed if the number of received packets at the destination node falls below 90 percent of the packets that are sent.


Correct Option: D

Why is it advisable that a network administrator use SSH instead of Telnet when managing switches?

  1. SSH uses TCP whereas Telnet does not.

  2. SSH encrypts only the username and password when logging in.

  3. SSH encrypts all remote management communications whereas Telnet does not.

  4. SSH sends a clear text message steam which reduces the bandwidth use for management.


Correct Option: C

Refer to the exhibit. Branch A has a non-Cisco router that is using IETF encapsulation and Branch B has a Cisco router. After the commands that are shown are entered, R1 and R2 fail to establish the PVC. The R2 LMI is Cisco, and the R1 LMI is ANSI. The LMI is successfully established at both locations. Why is the PVC failing?

  1. The PVC to R1 must be point-to-point.

  2. LMI types must match on each end of a PVC.

  3. The frame relay PVCs cannot be established between Cisco and non-Cisco routers.

  4. The IETF parameter is missing from the frame-relay map ip 10.10.10.1 201 command.


Correct Option: D

Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?

  1. Source

  2. End

  3. Transfer

  4. Intermediary


Correct Option: D

Which method is most effective in protecting the routing information that is propagated between routers on the network?

  1. Disable IP source routing.

  2. Configure passive interfaces.

  3. Configure routing protocol authentication.

  4. Secure administrative lines with Secure Shell.


Correct Option: C
- Hide questions