Vous êtes sur la page 1sur 24

CCNA Exam 200-120

Section 1
1. Which of the following statements is/are true with regard to the device shown
below? (Choose all that apply.)
A. It includes one collision domain and one broadcast domain
B. It includes one collision domain and 10 broadcast domains
C. It includes 10 collision domains and one broadcast domain
D. It includes one collision domain and 10 broadcast domains
E. It includes 10 collision domains and 10 broadcast domains.
2. With respect to the OSI model, which of the following are correct statements
about PDUs?
A. A segment contains IP addresses.
B. A packet contains IP addresses.
C. A segment contains MAC addresses.
D. A packet contains MAC addresses
3.You are the Cisco administrator for your company. A new branch office is opening
and you are selecting the necessary hardware to support the network. There will be two
groups of computers, each organized by department. The Sales group computers will
be assigned IP addresses ranging from 192.168.1.2 to 192.168.1.50. The Accounting
group will be assigned IP addresses ranging from 10.0.0.2 to 10.0.0.50. What type of
device should you select to connect the two groups of computers so that data commu-
nication can occur?
A. Hub
B. Switch
C. Router
D. Bridge
4. The most effective way to mitigate congestion on a LAN would be to ?
A. Upgrade the network cards
B. Change the cabling to CAT 6
C. Replace the hubs with switches
D. Upgrade the CPUs in the routers
5. You need to provide network connectivity to 150 client computers that will reside in
the same sub network, and each client computer must be allocated dedicated band-
width. Which device should you use to accomplish the task?
A. Hub
B. Switch
C. Router
D. Bridge
6. Which of the following is an example of a routed protocol?
A. EIGRP
B. IP
C. OSPF
D. BGP
7. Which of the following is NOT a function carried out on the Application layer of the
OSI model?
A. email
B. data translation and code formatting
C. file transfers
D. client/server processes
8. Which of the following layers of the OSI model was later subdivided into two
layers?
A. Presentation
B. Transport
C. Data Link
D. Physical
9. An example of a device that operates on the physical layer is a .
A. Hub
B. Switch
C. Router
D. Bridge
10.Which of the following is NOT a benefit of using a reference model?
A. divides the network communication process into smaller and simpler
components
B. encourages industry standardization
C. enforces consistency across vendors
D. allows various types of network hardware and software to communicate
11.Which of the following statements is not true with regard to routers?
A. They forward broadcasts by default
B. They can filter the network based on Network layer information
C. They perform path selection
D. They performpacket switching
12.Switches break up _______ domains and routers break up ___
domains.
A. broadcast, broadcast
B. collision, collision
C. collision, broadcast
D. broadcast, collision
13. How many collision domains are present in the diagram below?
A. eight
B. nine
C. ten
D. eleven
15. Which of the following layers of the OSI model is not involved in defining how the
applications within the end stations will communicate with each other as well as with
users?
A. Transport
B. Application
C. Presentation
D. Session
16. Which if the following is the ONLY device that operates at all layers of the OSI
model?
A. Network host
B. Switch
C. Router
D. Bridge
14. How many collision domains are present in the
diagram below?
Section 2
1. On a VLSM network, which mask should you use on point-to-point WAN links in
order to reduce the waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
E. /31
2. In the diagram below, in order to have as efficient IP addressing as possible, which
network should use a /29 mask?
A. A
B. B
C. C
D. D
3. To use VLSM, what capability must the routing protocols in use possess?
A. Support for multicast
B. Multiprotocol support
C. Transmission of subnet mask information
D. Support for unequal load balancing
4. If Host A is configured with an incorrect default gateway and all other computers
and the router are known to be configured correctly, which of the following statements
is TRUE?
A. Host A cannot communicate with the router.
B. Host A can communicate with other hosts in the same subnet.
C. Host A can communicate with hosts in other subnets.
D. Host A can communicate with no other systems.
5. Which of the following troubleshooting steps, if completed successfully, also
confirms
the other steps will succeed as well?
A. ping a remote computer
B. ping the loopback address
C. ping the NIC
D. ping the default gateway
6. When a ping to the local host IP address fails, what can you assume?
A. The IP address of the local host is incorrect.
B. The IP address of the remote host is incorrect.
C. The NIC is not functional.
D. The IP stack has failed to initialize.
7. When a ping to the local host IP address succeeds but a ping to the default gateway
IP address fails, what can you rule out? (Choose all that apply.)
A. The IP address of the local host is incorrect.
B. The IP address of the gateway is incorrect.
C. The NIC is not functional.
D. The IP stack has failed to initialize.
8.When you issue the ping command, what protocol are you using?
A. DNS
B. DHCP
C. ARP
D. ICMP
9.What network service is the most likely problem if you can ping a computer by IP
address but not by name?
A. DNS
B. DHCP
C. ARP
D. ICMP
10.Which of the following commands displays the networks traversed on a path to a
network destination?
A. ping
B. traceroute
C. pingroute
D. pathroute
11.What command generated the output shown below?
Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
Reply from 172.16.10.2: bytes=32 time<1ms TTL=128
A. traceroute
B. show ip route
C. ping
D. pathping
12. Which of the following network addresses correctly summarizes the three networks
shown below efficiently?
10.0.0.0/16
10.1.0.0/16
10.2.0.0/16
A. 10.0.0.0/15
B. 10.1.0.0/8
C. 10.0.0.0/14
D. 10.0.0.8/16
13. What command displays the ARP table on a Cisco router?
A. show ip arp
B. traceroute
C. arp -a
D. tracert
14. What switch must be added to the ipconfig command on a PC to verify DNS
configuration?
A. /dns
B. -dns
C. /all
D. showall
15. Which of the following is the best summarization of the following networks:
192.168.128.0 through 192.168.159.0
A. 192.168.0.0/24
B. 192.168.128.0/16
C. 192.168.128.0/19
D. 192.168.128.0/20
Section 3
1. What is the maximum number of IP addresses that can be assigned to hosts on a local
subnet that uses the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 62
2. You have a network that needs 29 subnets while maximizing the number of host
addresses available on each subnet. How many bits must you borrow from the host
field to provide the correct subnet mask?
A. 2
B. 3
C. 4
D. 5
E. 6
F. 7
3. What is the subnetwork address for a host with the IP address 200.10.5.68/28?
A. 200.10.5.56
B. 200.10.5.32
C. 200.10.5.64
D. 200.10.5.0
4. The network address of 172.16.0.0/19 provides how many subnets and hosts?
A. 7 subnets, 30 hosts each
B. 7 subnets, 2,046 hosts each
C. 7 subnets, 8,190 hosts each
D. 8 subnets, 30 hosts each
E. 8 subnets, 2,046 hosts each
F. 8 subnets, 8,190 hosts each
5. Which two statements describe the IP address 10.16.3.65/23? (Choose two.)
A. The subnet address is 10.16.3.0 255.255.254.0.
B. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.
C. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.
D. The broadcast address of the subnet is 10.16.3.255 255.255.254.0.
E. The network is not subnetted.
6. If a host on a network has the address 172.16.45.14/30, what is the subnetwork this
host belongs to?
A. 172.16.45.0
B. 172.16.45.4
C. 172.16.45.8
D. 172.16.45.12
E. 172.16.45.16
7. Which mask should you use on point-to-point WAN links in order to reduce the
waste of IP addresses?
A. /27
B. /28
C. /29
D. /30
E. /31
8. What is the subnetwork number of a host with an IP address of 172.16.66.0/21?
A. 172.16.36.0
B. 172.16.48.0
C. 172.16.64.0
D. 172.16.0.0
9. You have an interface on a router with the IP address of 192.168.192.10/29. Including
the router interface, how many hosts can have IP addresses on the LAN attached to
the router interface?
A. 6
B. 8
C. 30
D. 62
E. 126
10.You need to configure a server that is on the subnet 192.168.19.24/29. The router has
the first available host address. Which of the following should you assign to the
server?
A. 192.168.19.0 255.255.255.0
B. 192.168.19.33 255.255.255.240
C. 192.168.19.26 255.255.255.248
D. 192.168.19.31 255.255.255.248
E. 192.168.19.34 255.255.255.240
11.You have an interface on a router with the IP address of 192.168.192.10/29. What is
the broadcast address the hosts will use on this LAN?
A. 192.168.192.15
B. 192.168.192.31
C. 192.168.192.63
D. 192.168.192.127
E. 192.168.192.255
12.You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which
classful subnet mask would you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
13.You configure a router interface with the IP address 192.168.10.62 255.255.255.192
and receive the following error:
Bad mask /26 for address 192.168.10.62
Why did you receive this error?
A. You typed this mask on a WAN link and that is not allowed.
B. This is not a valid host and subnet mask combination.
C. ip subnet-zero is not enabled on the router.
D. The router does not support IP.
14.If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what
would be the valid subnet address of this interface?
A. 172.16.112.0
B. 172.16.0.0
C. 172.16.96.0
D. 172.16.255.0
E. 172.16.128.0
15. Using the following illustration, what would be the IP address of E0 if you were
using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last
available IP address in the range. The zero subnet should not be considered valid for
this question.
A. 192.168.10.142
B. 192.168.10.66
C. 192.168.100.254
D. 192.168.10.143
E. 192.168.10.126
16. Using the illustration from the previous question, what would be the IP address of
S0 if you were using the first subnet? The network ID is 192.168.10.0/28 and you need
to use the last available IP address in the range. Again, the zero subnet should not be
con- sidered valid for this question.
A. 192.168.10.24
B. 192.168.10.62
C. 192.168.10.30
D. 192.168.10.127
17.Which configuration command must be in effect to allow the use of 8 subnets if the
Class C subnet mask is 255.255.255.224?
A. Router(config)#ip classless
B. Router(config)#ip version 6
C. Router(config)#no ip classful
D. Router(config)#ip unnumbered
E. Router(config)#ip subnet-zero
F. Router(config)#ip all-nets
18. You have a network with a subnet of 172.16.17.0/22. Which is the valid host
address?
A. 172.16.17.1 255.255.255.252
B. 172.16.0.1 255.255.240.0
C. 172.16.20.1 255.255.254.0
D. 172.16.16.1 255.255.255.240
E. 172.16.18.255 255.255.252.0
F. 172.16.0.1 255.255.255.0
19. Your router has the following IP address on Ethernet0: 172.16.2.1/23. Which of the
following can be valid host IDs on the LAN interface attached to the router? (Choose
two.)
A. 172.16.0.5
B. 172.16.1.100
C. 172.16.1.198
D. 172.16.2.255
E. 172.16.3.0
F. 172.16.3.255
20. To test the IP stack on your local host, which IP address would you ping?
A. 172.0.0.1
B. 1.0.0.127
C. 127.0.0.1
D. 127.255.255.255
E. 255.255.255.255
Section 4
1. What must happen if a DHCP IP conflict occurs?
A. Proxy ARP will fix the issue.
B. The client uses a gratuitous ARP to fix the issue.
C. The administrator must fix the conflict by hand at the DHCP server.
D. The DHCP server will reassign new IP addresses to both computers.
2. Which of the following Application layer protocols sets up a secure session that's
similar to Telnet?
A. FTP
B. SSH
C. DNS
D. DHCP
3. Which of the following mechanisms is used by the client to avoid a duplicate IP
address
during the DHCP process?
A. ping
B. traceroute
C. gratuitous arp
D. pathping
4. What protocol is used to find the hardware address of a local device?
A. RARP
B. ARP
C. IP
D. ICMP
E. BootP
5. Which of the following are layers in the TCP/IP model? (Choose three.)
A. Application
B. Session
C. Transport
D. Internet
E. Data Link
F. Physical
6. Which class of IP address provides a maximum of only 254 host addresses per
network ID?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
7. Which of the following describe the DHCP Discover message? (Choose two.)
A. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
B. It uses UDP as the Transport layer protocol.
C. It uses TCP as the Transport layer protocol.
D. It does not use a layer 2 destination address.
8. Which layer 4 protocol is used for a Telnet connection?
A. IP
B. TCP
C. TCP/IP
D. UDP
E. ICMP
9. Private IP addressing was specified in RFC ____________
10. Which of the following services use TCP? (Choose three.)
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP
=
11. Which Class of IP addresses uses the pattern shown below?
Network Network Network Host
A. Class A
B. Class B
C. Class C
D. Class D
12.Which of the following is an example of a multicast address?
A. 10.6.9.1
B. 192.168.10.6
C. 224.0.0.10
D. 172.16.9.5
13. If you use either Telnet or FTP, what layer are you using to generate the data?
A. Application
B. Presentation
C. Session
D. Transport
14.The DoD model (also called the TCP/IP stack) has four layers. Which layer of the
DoD model is equivalent to the Network layer of the OSI model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
15.Which two of the following are private IP addresses?
A. 12.0.0.1
B. 168.172.19.39
C. 172.20.14.36
D. 172.33.194.30
E. 192.168.24.43
16.What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI
model?
A. Application
B. Host-to-Host
C. Internet
D. Network Access
17.Which statements are true regarding ICMP packets? (Choose two).
A. ICMP guarantees datagram delivery.
B. ICMP can provide hosts with information about network problems.
C. ICMP is encapsulated within IP datagrams.
D. ICMP is encapsulated within UDP datagrams.
18.What is the address range of a Class B network address in binary?
A. 01xxxxxx
B. 0xxxxxxx
C. 10xxxxxx
D. 110xxxxx
Section 4
1. A network administrator issues the ping 192.168.2.5 command and successfully tests
connectivity to a host that has been newly connected to the network. Which protocols were used
during the test? (Choose two)
A. ARP
B. CDP
C. DHCP
D. DNS
E. ICMP
2. Refer to the exhibit. What command sequence will enable NAT from the inside to outside
network?
ip nat pool isp-net 1.2.4.10 1.2.4.240 netmask 255.255.255.0
!
interface ethernet 1
description ISP Connection
ip address 1.2.4.2 255.255.255.0
ip nat outside
!
interface ethernet 0
description Ethernet to Firewall eth0
ip address 10.10.0.1 255.255.255.0
ip nat inside
!
access-list 1 permit 10.0.0.0 0.255.255.255
A. (config)# ip nat pool isp-net 1.2.4.2 netmask 255.255.255.0 overload
B. (config-if)# ip nat outside overload
C. (config)# ip nat inside source list 1 interface ethernet1 overload
D. (config-if)# ip nat inside overload
3. Refer to the exhibit. A junior network engineer has prepared the exhibited configuration file.
What two statements are true of the planned configuration for interface fa0/1? (Choose two)
A. The two FastEthernet interfaces will require NAT configured on two outside serial interfaces.
B. Address translation on fa0/1 is not required for DMZ Devices to access the Internet.
C. The fa0/1 IP address overlaps with the space used by s0/0.
D. The fa0/1 IP address is invalid for the IP subnet on which it resides.
E. Internet hosts may not initiate connections to DMZ Devices through the configuration that is
shown.
4. Which two benefits are provided by creating VLANs? (Choose two)
A. added security
B. dedicated bandwidth
C. provides segmentation
D. allows switches to route traffic between subinterfaces
E. contains collisions
5. Which command is used to configure a default route?
A. ip route 172.16.1.0 255.255.255.0 0.0.0.0
B. ip route 172.16.1.0 255.255.255.0 172.16.2.1
C. ip route 0.0.0.0 255.255.255.0 172.16.2.1
D. ip route 0.0.0.0 0.0.0.0 172.16.2.1
6. When troubleshooting a Frame Relay connection, what is the first step when performing a
loopback test?
A. Set the encapsulation of the interface to HDLC.
B. Place the CSU/DSU in local-loop mode.
C. Enable local-loop mode on the DCE Frame Relay router.
D. Verify that the encapsulation is set to Frame Relay.
7. Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco
routers?
A. Q933-A Annex A
B. IETF
C. ANSI Annex D
D. HDLC
8. Which two statements are true regarding EIGRP? (Choose two)
A Passive routes are in the process of being calculated by DUAL
B EIGRP supports VLSM, route summarization, and routing update authentication
C EIGRP exchanges full routing table information with neighboring routers with every update
D If the feasible successor has a higher advertised distance than the successor route, it becomes
the primary route
E A query process is used to discover a replacement for a failed route if a feasible successor is
not identified from the current routing information
9. A network administrator is troubleshooting an EIGRP problem on a router and needs to
confirm the IP addresses of the devices with which the router has established adjacency. The
retransmit interval and the queue counts for the adjacent routers also need to be checked. What
command will display the required information?
A. Router# show ip eigrp adjacency
B. Router# show ip eigrp topology
C. Router#show ip eigrp interfaces
D. Router#show ip eigrp neighbors
10. Refer to the graphic. It has been decided that PC1 should be denied access to Server. Which
of the following commands are required to prevent only PC1 from accessing Server1 while
allowing all other traffic to flow normally? (Choose two)
A Router(config)# interface fa0/0
Router(config-if)# ip access-group 101 out
B Router(config)# interface fa0/0
Router(config-if)# ip access-group 101 in
C Router(config)# access-list 101 deny ip host 172.16.161.150 host 172.16.162.163
Router(config)# access-list 101 permit ip any any
D Router(config)# access-list 101 deny ip 172.16.161.150 0.0.0.255 172.16.162.163 0.0.0.0
Router(config)# access-list 101 permit ip any any
11. A network administrator wants to add a line to an access list that will block only Telnet
access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5. What command
should be issued to accomplish this task?
A access-list 101 deny tcp 192.168.1.128 0.0.0.15 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
B access-list 101 deny tcp 192.168.1.128 0.0.0.240 192.168.1.5 0.0.0.0 eq 23
access-list 101 permit ip any any
C access-list 1 deny tcp 192.168.1.128 0.0.0.255 192.168.1.5 0.0.0.0 eq 21
access-list 1 permit ip any any
D access-list 1 deny tcp 192.168.1.128 0.0.0.15 host 192.168.1.5 eq 23
access-list 1 permit ip any any
12. The following access list below was applied outbound on the E0 interface connected to the
192.169.1.8/29 LAN:
access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any
access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any
How will the above access lists affect traffic?
A FTP traffic from 192.169.1.22 will be denied
B No traffic, except for FTP traffic will be allowed to exit E0
C FTP traffic from 192.169.1.9 to any host will be denied
D All traffic exiting E0 will be denied
E All FTP traffic to network 192.169.1.9/29 will be denied
13. Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is
destined for 172.16.12.10 if the traffic is processed by this ACL?
router#show access-lists
Extended IP access list 110
10 deny tcp 172.16.0.0 0.0.255.255 any eq telnet
20 deny tcp 172.16.0.0 0.0.255.255 any eq smtp
30 deny tcp 172.16.0.0 0.0.255.255 any eq http
40 permit tcp 172.16.0.0 0.0.255.255 any
A. Traffic will be dropped per line 30 of the ACL.
B. Traffic will be accepted per line 40 of the ACL.
C. Traffic will be dropped, because of the implicit deny all at the end of the ACL.
D. Traffic will be accepted, because the source address is not covered by the ACL.
14. In which solution is a router ACL used?
A. protecting a server from unauthorized access
B. controlling path selection, based on the route metric
C. reducing router CPU utilization
D. filtering packets that are passing through a router
15. If the subnet mask is 255.255.255.224, which of the following addresses can be assigned to
network hosts? (Choose three)
A 15.234.118.63
B 92.11.178.93
C 134.178.18.56
D 192.168.16.87
16. Which statement about access lists that are applied to an interface is true?
A. you can apply only one access list on any interface
B. you can configure one access list, per direction, per layer 3 protocol
C. you can place as many access lists as you want on any interface
D. you can configure one access list, per direction, per layer 2 protocol
17. The network administrator is asked to configure 113 point-to-point links. Which IP
addressing scheme best defines the address range and subnet mask that meet the requirement and
waste the fewest subnet and host addresses?
A. 10.10.0.0/18 subnetted with mask 255.255.255.252
B. 10.10.0.0/25 subnetted with mask 255.255.255.252
C. 10.10.0.0/24 subnetted with mask 255.255.255.252
D. 10.10.0.0/23 subnetted with mask 255.255.255.252
E. 10.10.0.0/16 subnetted with mask 255.255.255.252
Lab Question
18. Please use the following topology to complete this lab exercise:
Task 1:
Configure the hostnames on routers R1 and R3 as illustrated in the topology.
Task 2:
Configure R1 S0/0 which is a DCE to provide a clock rate of 768Kbps to R3. Configure the IP
addresses on the Serial interfaces of R1 and R3 as illustrated in the topology. Configure a static
default route on R1 pointing to R3 over the Serial connection between the two routers. Also
configure a static default route on R3 pointing to R1 via the Serial connection between the two
routers. Configure the Loopback interfaces specified in the diagram on R1 and R3.
Task 3:
To test connectivity, ping R1 from R3 Serial0/0, Loopback10, Loopback20 and Loopback30
interfaces. To ping from the Loopback interfaces, use the ping <ip_address> source
<interface> command.
Task 4:
On R1, create a standard numbered ACL to prevent inbound traffic from the Loopback20 subnet
on R3, but explicitly allow all inbound traffic from Loopback10 and Loopback30 subnets on R3.
Apply this ACL inbound on Serial0/0. Now, try to ping R1 from R3 Serial0/0, Loopback10,
Loopback20, and Loopback30 using the ping <ip_address> source <interface>. If you have
configured this correctly, only Loopback10 and Loopback30 should still be able to ping.

Vous aimerez peut-être aussi