0

CCNA Practice Test - 27

Description: CCNA Practice Test - 27
Number of Questions: 21
Created by:
Tags: CCNA Practice Test - 27 CCNA
Attempted 0/20 Correct 0 Score 0

Refer to the exhibit. While trying to diagnose a routing problem in the network, the network administrator runs the debug ip rip command. What can be determined from the output of this command?

  1. The router will be unable to ping 192.168.1.2.

  2. The router has two interfaces that participate in the RIP process.

  3. The router will forward the updates for 192.168.1.0 on interface Serial0/0/1.

  4. The router is not originating routes for 172.16.1.0.


Correct Option: D

Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router Router1 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which of the following actions will correct the problem but still restrict other traffic between the two networks?

  1. Apply the ACL in the inbound direction.

  2. Apply the ACL on the FastEthernet 0/0 interface.

  3. Reverse the order of the TCP protocol statements in the ACL.

  4. Modify the second entry in the list to permit tcp host 172.16.10.10 any eq telnet.


Correct Option: C

Refer to the exhibit. Assume all devices are using default configurations. How many subnets are required to address the topology that is shown?

  1. 1

  2. 3

  3. 4

  4. 5

  5. 7


Correct Option: B

Refer to the exhibit. A technician is teaching a trainee to interpret the results of various frame relay troubleshooting commands. What conclusion can be drawn from the output that is shown?

  1. Neighbouring routers should use DLCI 177 to reach the branch router.

  2. DLCI 177 will be used to identify all broadcasts that are sent out the branch router.

  3. The branch router has the address 192.168.3.1 configured for the S0/0/0 interface.

  4. To reach 192.168.3.1, the branch router will use the virtual circuit that is identified by DLCI 177.


Correct Option: D

Refer to the exhibit. The configuration steps that are listed in the exhibit have been entered in switch S1 via the console. Subsequent attempts to telnet to the switch are not successful. What is causing the problem?

  1. The switch must be configured with SSH version 1.

  2. The transport input command must specify Telnet access.

  3. The RSA keys must be returned to zero before SSH will permit Telnet access.

  4. The IP domain-name command must also be entered in line configuration mode for the vty lines.


Correct Option: B

Which of the following frame relay flow control mechanisms is used to signal routers that they should reduce the flow rate of frames?

  1. DE

  2. BE

  3. CIR

  4. FECN

  5. CBIR


Correct Option: D

Refer to the exhibit. The output of the show ip route command for router R1 is displayed. What action will the router take for a packet that is destined for 192.168.1.5?

  1. It will drop the packet.

  2. It will forward the packet to interface Serial0/0/0.

  3. It will determine the route for the packet through a routing protocol.

  4. It will forward the packet to the default gateway.


Correct Option: D

Refer to the exhibit. What command was executed on a host computer to produce the results shown?

  1. route PRINT

  2. arp-a

  3. arp-d

  4. netstat


Correct Option: A

At which OSI Layer are data representation, compression, and encryption defined?

  1. Data Link

  2. Session

  3. Presentation

  4. Application


Correct Option: C
Explanation:

Data representation, compression, and encryption are defined at the Presentation layer of the OSI model.

Which of the following statements correctly describes a feature of RIP?

  1. RIP is a link-state routing protocol.

  2. RIP uses only one metric hop count for path selection.

  3. Advertised routes with hop counts greater than 10 are unreachable.

  4. Messages are broadcast every 10 seconds.


Correct Option: B

Your supervisor has asked you to setup an access list that will filter on source addresses only. Which of the following access lists filter on the source address only?

  1. Standard access list

  2. Extended access list

  3. Dynamic access list

  4. Named access list


Correct Option: A
Explanation:

Standard access list filters by source address. This is as basic filtering form as it gets. If a standard ACL is applied, the switch router compares the source IP address with the ACL.

What occurs when a rogue access point is added to a WLAN?

  1. Authorized access points can transmit excess traffic to rogue access points to help alleviate congestion.

  2. Unauthorized users can gain access to internal servers, thus causing a security hole.

  3. All traffic that uses the same channel as the rogue access point will be encrypted.

  4. All traffic that uses the same channel as the rogue access point will be required to authenticate.


Correct Option: B

Refer to the exhibit. Each switch is shown with its MAC address. Which of the following switches will be elected as the spanning-tree root bridge if the switches are configured with their default priority values?

  1. Switch A

  2. Switch B

  3. Switch C

  4. Switch D

  5. Switch F


Correct Option: D

You are troubleshooting a problem with SNMP. At what layer of the OSI model does SNMP operate?

  1. Transport

  2. Application

  3. Network

  4. Physical


Correct Option: B
Explanation:

An application that communicates with other computers is implementing OSI application layer concepts. The application layer refers to communications services to applications. For example, a word processor that lacks communications capabilities would not implement code for communications, and word processor programmers would not be concerned about OSI Layer 7. However, if an option for transferring a file were added, the word processor would need to implement OSI Layer 7 (or the equivalent layer in another protocol specification).

As compared to SSH, what is the primary disadvantage of telnet?

  1. Not widely available

  2. Does not support encryption

  3. Consumes more network bandwidth

  4. Does not support authentication


Correct Option: B

A new network administrator is given the task of selecting an appropriate dynamic routing protocol for a software development company. The company has over 100 routers, uses CIDR and VLSM, requires fast convergence, and uses both Cisco and non-Cisco equipment. Which routing protocol is appropriate for this company?

  1. RIP version 2

  2. IGRP

  3. EIGRP

  4. OSPF

  5. BGP


Correct Option: C

A switch operating STP has just been powered up. You know it will run through various port states before becoming a fully functional switch. What is the correct order of port states that a switch running STP will transition though from initialization?

  1. Blocking, listening, learning, forwarding, disabled

  2. Listening, learning, disabled, forwarding, blocking

  3. Learning, disabled, forwarding, blocking, listening

  4. Forwarding, disabled, blocking, listening, learning


Correct Option: A
Explanation:

A Switch with STP enabled on its Layer 2 interface moves through these five states as follows:

  • From initialization to blocking 
  • From blocking to listening or to disabled 
  • From listening to learning or to disabled 
  • From learning to forwarding or to disabled 
  • From forwarding to disabled

Which of the following statements accurately describes a role that is played in establishing a WAN connection?

  1. ISDN and ATM are circuit-switched technologies that are used to establish on demand a path through the service provider network.

  2. Data link layer protocols like PPP and HDLC define how data is encapsulated for transmission across a WAN link.

  3. A packet-switching network establishes a dedicated circuit between nodes for the duration of the communication session.

  4. Frame relay switches are normally considered to be customer premises equipment (CPE) and are maintained by local administrators.


Correct Option: B

A router needs an IOS upgrade. Which component must be checked to make sure it meets the requirement for the new IOS?

  1. Boot ROM

  2. Fast Ethernet ports

  3. Flash

  4. Serial ports

  5. UART


Correct Option: B

Excessive broadcasts are generally a symptom of a problem at which layer?

  1. Physical

  2. Data link

  3. Network

  4. Transport


Correct Option: B
- Hide questions