0

CCNA Practice Test - 14

Description: CCNA Practice Test - 14
Number of Questions: 21
Created by:
Tags: CCNA Practice Test - 14 CCNA
Attempted 0/20 Correct 0 Score 0

What is the basic characteristic of switches and hubs?

  1. Hubs cannot filter frames.

  2. Using hubs is costly with regard to bandwidth availability.

  3. Switches do and can not forward broadcasts.

  4. Switches increase the number of collision domains in the network.


Correct Option: D
Explanation:

Switches increases the number of collisions domains in the network. Switches that are configured with VLANs will reduce the size of the collision domains by increasing the number of collision domains in a network, but making them smaller than that of one big, flat network.

Refer to the exhibit. Host A is connected to the LAN, but it cannot get access to any resources on the Internet. The configuration of the host is shown in the exhibit. What could be the cause of the problem?

  1. The host subnet mask is incorrect.

  2. The default gateway is a network address.

  3. The default gateway is a broadcast address.

  4. The default gateway is on a different subnet from the host.


Correct Option: D

When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?

  1. The hosts return to a listen-before-transmit mode.

  2. The hosts creating the collision have priority to send data.

  3. The hosts creating the collision retransmit the last 16 frames.

  4. The hosts extend their delay period to allow for rapid transmission.


Correct Option: A

Refer to the exhibit. What will be the effect of the configuration that is shown?

  1. Users attempting to access hosts in the 192.168.30.0/24 network will be required to telnet to R3.

  2. Hosts connecting to resources in the 191.68.30.0/24 network have an idle timeout of 15 minutes.

  3. Hosts connecting to resources in the 191.68.30.0/24 network have an idle timeout of 15 minutes.

  4. Telnet access to R3 will only be permitted on Serial 0/0/1.


Correct Option: A

What consideration must be taken into account if RIP is used on Frame Relay multiaccess networks?

  1. To forward routing updates, address-to-DLCI mapping must be done via the use of the frame-relay.

  2. map command coupled with the broadcast keyword.

  3. Inverse ARP must be enabled to turn routing update broadcasts into unicast traffic that can be propagated to other Frame Relay nodes.

  4. Because broadcast traffic is not supported, RIPv1 cannot be implemented on Frame Relay networks.

  5. To forward broadcast routing updates, dynamic mapping must be enabled.


Correct Option: A

Refer to the exhibit. What protocol was used to distribute the routing information for the network 172.16.1.4?

  1. RIPv1

  2. RIPv2

  3. EIGRP

  4. OSPF


Correct Option: B

Refer to the exhibit. Users who are connected to R1 report that they are unable to establish connectivity to the users who are connected to router R2. A network administrator tests the link with the debug ppp authentication command. Based on the output shown, which statement correctly defines the problem on the link?

  1. R1 uses PAP as a method of authentication, and R2 uses CHAP.R1 uses PAP as a method of authentication, and R2 uses CHAP.

  2. R1 uses PAP as a method of authentication, and R2 uses CHAP.

  3. R1 uses an incorrect user name or password for CHAP authentication.

  4. R2 uses an incorrect user name or password for PAP authentication.


Correct Option: A

What combination of IP address and wildcard mask should be used to specify only the last 8 addresses in the subnet 192.168.3.32/28?

  1. 192.168.3.32 0.0.0.7

  2. 192.168.3.32 0.0.0.15

  3. 192.168.3.40 0.0.0.7

  4. 192.168.3.40 0.0.0.15


Correct Option: C

What is the default update period in seconds for the RIP routing protocol?

  1. 10

  2. 12

  3. 15

  4. 30

  5. 20


Correct Option: D

Refer to the exhibit. What is accomplished when both commands are configured on the router?

  1. The commands filter UDP and TCP traffic coming to the router.

  2. The commands disable any TCP or UDP request sent by the routing protocols.

  3. The commands disable the services such as echo, discard, and chargen on the router to prevent security vulnerabilities.

  4. The commands disable the BOOTP and TFTP server services to prevent security vulnerabilities.


Correct Option: C

When is a straight-through cable used in a network?

  1. when connecting a through the console port

  2. when connecting one switch to another switch

  3. when connecting a host to a switch

  4. when connecting a router to another router


Correct Option: C

What is the primary purpose of ARP?

  1. translate URLs to IP addresses

  2. resolve IPv4 addresses to MAC addresses

  3. provide dynamic IP configuration to network devices

  4. convert internal private addresses to external public addresses


Correct Option: B

Refer to the exhibit. Which command will advertise the 192.168.1.64/30 network but not the 192.168.1.32 network on router A?

  1. network 192.168.1.0

  2. network 192.168.1.0 255.255.255.0

  3. network 192.168.1.64 0.0.0.3

  4. network 192.168.1.64 0.0.0.7

  5. network 192.168.1.64 0.0.0.255


Correct Option: C

Refer to the exhibit. The graphic contains partial contents of the routing table on router E. Router E is running version 12.3 of the IOS and is configured for default routing behavior. Router E receives a packet to forward. Which route in the routing table will be searched first and why?

  1. 172.16.1.0/25 because it is the first ultimate route

  2. 0.0.0.0/0 because it is the lowest network number

  3. 172.16.0.0/25 because it is the first level 1 route

  4. 172.18.0.0/15 because it has the shortest mask


Correct Option: C

Refer to the exhibit. What subnet mask will be applied if Router A sends a RIPv1 update for the network 172.16.1.0 to Router B?

  1. None of these

  2. 8

  3. 16

  4. 24


Correct Option: D

A network administrator determines that falsified routing information is propagating through the network. What action can be used to address this threat?

  1. Update the IOS images.

  2. Change console passwords.

  3. Employ end-user authentication.

  4. Configure routing protocol authentication.


Correct Option: D

Which routing protocol maintains a topology table separate from the routing table?

  1. IGRP

  2. RIPv1

  3. RIPv2

  4. EIGRP


Correct Option: D

Which combination is required to establish a connection to initially configure the Linksys WRT300N wireless access device?

  1. a computer with a console connection to the WRT300N

  2. a computer with a wireless connection to the WRT300N

  3. a computer with an AUX port connection to the WRT300N

  4. a computer configured in the same IP subnet as the WRT300N and a direct cable connection to it


Correct Option: D

What is a group of hosts called that have identical bit patterns in the high order bits of their addresses?

  1. an internet

  2. a network

  3. an octet

  4. a radi


Correct Option: B

What will happen if a collision occurs in an Ethernet network?

  1. Both stations will retransmit the data after a random wait time created by a backoff algorithm.

  2. Both stations will send out a warning on the network before they retransmit the data.

  3. A Transport layer protocol such as UDP or TCP will request a retransmission of the data.

  4. One of the stations data transmission will fail.


Correct Option: A
Explanation:

The access method (how the physical wire is accessed)in an Ethernet network is Carrier Sense Multiple Access/Collision Detection (CSMA/CD). In a CSMA/CD network stations listen to check if the network is busy, if the network is free the station transmits data. When two stations listen, and both determine the network is not busy, and start sending the data simultaneously a collision occurs. When the collision is detected both stations will retransmit the data after a random wait time created by a backoff algorithm.

- Hide questions