0

CCNA Practice Test - 25

Description: CCNA Practice Test - 25
Number of Questions: 20
Created by:
Tags: CCNA Practice Test - 25 CCNA
Attempted 0/19 Correct 0 Score 0

A network administrator needs to allow traffic through the firewall router for sessions that originate from within the company network, but the administrator must block traffic for sessions that originate outside the network of the company. What type of ACL is most appropriate?

  1. dynamic

  2. port-based

  3. reflexive

  4. time-based


Correct Option: C

Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the DC office of ABC Company to the Orlando office?

  1. MAC address of the Orlando router

  2. MAC address of the DC router

  3. 192.168.1.25

  4. DLCI 100

  5. DLCI 200


Correct Option: E

Refer to the exhibit. The broadcast traffic from PC1 is consuming bandwidth on the interswitch trunks. What should be done to prevent this from happening?

  1. Move PC1 to a port on SW3.

  2. Move PC2 to a port on SW3.

  3. Move PC1 to a port on SW2.

  4. Enable pruning for VLAN10 on the VTP server.

  5. Associate PC1 as a member of a new VLAN.


Correct Option: D

An installed fiber run can be checked for faults, integrity, and the performance of the media by using what device?

  1. light injector

  2. OTDR

  3. TDR

  4. multimeter


Correct Option: B

A fully converged five OSPF network has been running successfully for several weeks. All configurations have been saved and no static routes are used. If one router looses power and reboots, what information will be in its routing table after the configuration file is loaded but before OSPF has converged?

  1. All routes for the entire network will be present.

  2. Directly connected networks that are operational will be in the routing table.

  3. Because the SPF algorithm has not completed all calculations, no routes will be in the table.

  4. A summary route for all previously learned routes will automatically appear in the routing table until all LSPs have been received by the router.


Correct Option: B

Two routers Rtr1 and Rtr2 are both configured with RIP only. What will be the result when Rtr1 receives a routing update that contains a higher cost path to a network already in its routing table?

  1. The update information will replace the existing routing table entry.

  2. The update information will be added to the existing routing table.

  3. The existing routing table entry will be deleted from the routing table and all routers will exchange routing updates to reach convergence.

  4. The update will be ignored and no further action will be taken.


Correct Option: D

What PPP protocol provides dynamic addressing, authentication, and multilink?

  1. HDLC

  2. LCP

  3. NCP

  4. X.25


Correct Option: B

Why is the call setup time of a circuit-switched WAN implementation considered a drawback?

  1. Routing protocols are incompatible with this function.

  2. It restricts the communication sent to voice traffic only.

  3. A telephone must be used to initially start transferring data.

  4. Data cannot be transferred until a circuit has been established.


Correct Option: D

Which command would the network administrator issue to determine if load balancing is in effect on a router?

  1. show ip protocols

  2. show ip route

  3. show ip interface brief

  4. show ip interface


Correct Option: B

RIPv2 is the configured routing protocol on the routers in a network. The command Router(config-router)# no version 2 is entered on the routers. What effect does entering this command have on routing updates?

  1. Subnet masks will be added to the routing updates.

  2. Routing updates will be sent out using multicast address 224.0.0.9.

  3. Version 1 and 2 updates will be received and the version 2 updates will not be sent.

  4. The RIP routing process will be removed from the router and routing updates will not be forwarded.


Correct Option: C

Refer to the exhibit. How does SW1 manage traffic coming from Host A?

  1. SW1 drops the traffic because it is untagged.

  2. SW1 leaves the traffic untagged and forwards it over the trunk.

  3. SW1 tags the traffic with the lowest VLAN ID value and forwards it over the trunk link.

  4. SW1 encapsulates the traffic with 802.1Q encapsulation and forwards it over the trunk link.


Correct Option: B

Which protocol is used to look up an IP address from a known Ethernet address?

  1. TCP

  2. RARP

  3. ARP

  4. IP


Correct Option: B

What is a PDU?

  1. corruption of a frame during transmission

  2. data reassembled at the destination

  3. retransmitted packets due to lost communication

  4. a layer specific encapsulation


Correct Option: D

Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring?

  1. reconnaissance

  2. access

  3. DoS

  4. worm

  5. virus


Correct Option: C

Refer to the exhibit. ACL 120 is configured inbound on the serial0/0/0 interface on router R1, but the hosts on network 172.11.10.0/24 are able to telnet to network 10.10.0.0/16. On the basis of the provided configuration, what should be done to remedy the problem?

  1. Apply the ACL outbound on the serial0/0/0 interface on router R1.

  2. Apply the ACL outbound on the FastEthernet0/0 interface on router R1.

  3. Include the established keyword at the end of the first line in the ACL.

  4. Include a statement in the ACL to deny the UDP traffic that originates from 172.11.10.0/24 network.


Correct Option: A

Select the correct combination of Routing Protocol and Routing Protocol type.

  1. RIP -- Distance Vector

  2. RIP -- Link-State

  3. OSPF -- Distance Vector

  4. OSPF -- Link-State


Correct Option: A

Refer to the exhibit. The network administrator has just added VLAN 50 to Switch1 and Switch2 and assigned hosts on the IP addresses of the VLAN in the 10.1.50.0/24 subnet range. Computer A can communicate with computer B, but not with computer C or computer D. What is the most likely cause of this problem?

  1. There is a native VLAN mismatch.

  2. The link between Switch1 and Switch2 is up but not trunked.

  3. The is not properly configured for inter-VLAN routing.

  4. VLAN 50 is not allowed to entering the trunk between Switch1 and Switch2.


Correct Option: D

Refer to the exhibit. The 10.4.0.0 network fails. What mechanism prevents R2 from receiving false update information regarding the 10.4.0.0 network?

  1. split horizon

  2. hold-down timers

  3. route poisoning

  4. triggered updates


Correct Option: A

Which of the following options is the default subnet mask associated with a Class B IP address?

  1. 255.255.0.0

  2. 255.355.0.0

  3. 255.255.0.1

  4. 255.255.1.1


Correct Option: A
Explanation:

The default subnet mask associated with a Class B IP address is 255.255.0.0

- Hide questions