Académique Documents
Professionnel Documents
Culture Documents
1. Which of the following protocols are examples of TCP/IP transport layer protocols? (Choose two
answers.)
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
2. Which of the following protocols are examples of TCP/IP data link layer protocols? (Choose two
answers.)
a. Ethernet
b. HTTP
c. IP
d. UDP
e. SMTP
f. TCP
g. PPP
3. The process of HTTP asking TCP to send some data and making sure that it is received correctly
is an example of what?
a. Same-layer interaction
b. Adjacent-layer interaction
c. OSI model
d. All of these answers are correct.
4. The process of TCP on one computer marking a TCP segment as segment 1, and the receiving
computer then acknowledging the receipt of TCP segment 1 is an example of what?
a. Data encapsulation
b. Same-layer interaction
c. Adjacent-layer interaction
d. OSI model
e. All of these answers are correct.
5. The process of a web server adding a TCP header to the contents of a web page, followed by adding
an IP header and then adding a data link header and trailer, is an example of what?
a. Data encapsulation
b. Same-layer interaction
c. OSI model
d. All of these answers are correct.
6. Which of the following terms is used specifically to identify the entity created when encapsulating
data inside data link layer headers and trailers?
a. Data
b. Chunk
c. Segment
d. Frame
e. Packet
7. Which OSI layer defines the functions of logical network-wide addressing and routing?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5, 6, or 7
8. Which OSI layer defines the standards for cabling and connectors?
a. Layer 1
b. Layer 2
c. Layer 3
d. Layer 4
e. Layer 5, 6, or 7
###################################################################################
1. In the LAN for a small office, some user devices connect to the LAN using a cable, while others
connect using wireless technology (and no cable). Which of the following is true regarding the use of
Ethernet in this LAN?
a. Only the devices that use cables are using Ethernet.
b. Only the devices that use wireless are using Ethernet.
c. Both the devices using cables and those using wireless are using Ethernet.
d. None of the devices are using Ethernet.
2. Which of the following Ethernet standards defines Gigabit Ethernet over UTP cabling?
a. 10GBASE-T
b. 100BASE-T
c. 1000BASE-T
d. None of the other answers is correct.
3. Which of the following is true about Ethernet crossover cables for Fast Ethernet?
a. Pins 1 and 2 are reversed on the other end of the cable.
b. Pins 1 and 2 on one end of the cable connect to pins 3 and 6 on the other end of the cable.
c. Pins 1 and 2 on one end of the cable connect to pins 3 and 4 on the other end of the cable.
d. The cable can be up to 1000 meters long to cross over between buildings.
e. None of the other answers is correct.
4. Each answer lists two types of devices used in a 100BASE-T network. If these devices were
connected with UTP Ethernet cables, which pairs of devices would require a straight-through cable?
(Choose three answers.)
a. PC and router
b. PC and switch
c. Hub and switch
d. Router and hub
e. Wireless access point (Ethernet port) and switch
7. Which of the following are true about the format of Ethernet addresses? (Choose three answers.)
a. Each manufacturer puts a unique OUI code into the first 2 bytes of the address.
b. Each manufacturer puts a unique OUI code into the first 3 bytes of the address.
c. Each manufacturer puts a unique OUI code into the first half of the address.
d. The part of the address that holds this manufacturer’s code is called the MAC.
e. The part of the address that holds this manufacturer’s code is called the OUI.
f. The part of the address that holds this manufacturer’s code has no specific name.
8. Which of the following terms describe Ethernet addresses that can be used to send one frame that
is delivered to multiple devices on the LAN? (Choose two answers.)
a. Burned-in address
b. Unicast address
c. Broadcast address
d. Multicast address
1. In the cabling for a leased line, which of the following typically connects to a four-wire line provided
by a telco?
a. Router serial interface without internal CSU/DSU
b. CSU/DSU
c. Router serial interface with internal transceiver
d. Switch serial interface
2. Which of the following is an accurate speed at which a leased line can operate in the United States?
a. 100 Mbps
b. 100 Kbps
c. 256 Kbps
d. 6.4 Mbps
3. Which of the following fields in the HDLC header used by Cisco routers does Cisco add, beyond
the ISO standard HDLC?
a. Flag
b. Type
c. Address
d. FCS
4. Two routers, R1 and R2, connect using an Ethernet over MPLS service. The service provides point-
to point service between these two routers only, as a Layer 2 Ethernet service. Which of the following
are the most likely to be true about this WAN? (Choose two answers.)
a. R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2.
b. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at
the WAN service provider point of presence.
c. R1 will forward data-link frames to R2 using an HDLC header/trailer.
d. R1 will forward data-link frames to R2 using an Ethernet header/trailer.
5. Which of the following Internet access technologies, used to connect a site to an ISP, offers
asymmetric speeds? (Choose two answers.)
a. Leased lines
b. DSL
c. Cable Internet
d. BGP
6. Fred has just added DSL service at his home, with a separate DSL modem and consumer-grade
router with four Ethernet ports. Fred wants to use the same old phone he was using before the
installation of DSL. Which is most likely true about the phone cabling and phone used with his new
DSL installation?
a. He uses the old phone, cabled to one of the router/switch device’s Ethernet ports.
b. He uses the old phone, cabled to the DSL modem’s ports.
c. He uses the old phone, cabled to an existing telephone port and not to any new device.
d. The old phone must be replaced with a digital phone.
####################################################################################
1. Which of the following are functions of OSI Layer 3 protocols? (Choose two answers.)
a. Logical addressing
b. Physical addressing
c. Path selection
d. Arbitration
e. Error recovery
2. Which of the following is a valid Class C IP address that can be assigned to a host?
a. 1.1.1.1
b. 200.1.1.1
c. 128.128.128.128
d. 224.1.1.1
3. What is the assignable range of values for the first octet for Class A IP networks?
a. 0 to 127
b. 0 to 126
c. 1 to 127
d. 1 to 126
e. 128 to 191
f. 128 to 192
4. PC1 and PC2 are on two different Ethernet LANs that are separated by an IP router. PC1’s IP address
is 10.1.1.1, and no subnetting is used. Which of the following addresses could be used for PC2?
(Choose two answers.)
a. 10.1.1.2
b. 10.2.2.2
c. 10.200.200.1
d. 9.1.1.1
e. 225.1.1.1
f. 1.1.1.1
5. Imagine a network with two routers that are connected with a point-to-point HDLC serial link. Each
router has an Ethernet, with PC1 sharing the Ethernet with Router1 and PC2 sharing the Ethernet
with Router2. When PC1 sends data to PC2, which of the following is true?
a. Router1 strips the Ethernet header and trailer off the frame received from PC1, never to be used again.
b. Router1 encapsulates the Ethernet frame inside an HDLC header and sends the frame to Router2,
which extracts the Ethernet frame for forwarding to PC2.
c. Router1 strips the Ethernet header and trailer off the frame received from PC1, which is exactly recreated
by Router2 before forwarding data to PC2.
d. Router1 removes the Ethernet, IP, and TCP headers and rebuilds the appropriate headers before
forwarding the packet to Router2.
6. Which of the following does a router normally use when making a decision about routing TCP/IP
packets?
a. Destination MAC address
b. Source MAC address
c. Destination IP address
d. Source IP address
e. Destination MAC and IP addresses
7. Which of the following are true about a LAN connected TCP/IP host and its IP routing (forwarding)
choices? (Choose two answers.)
a. The host always sends packets to its default gateway.
b. The host sends packets to its default gateway if the destination IP address is in a different class of IP
network than the host.
c. The host sends packets to its default gateway if the destination IP address is in a different subnet than the
host.
d. The host sends packets to its default gateway if the destination IP address is in the same subnet as the
host.
8. Which of the following are functions of a routing protocol? (Choose two answers.)
a. Advertising known routes to neighboring routers
b. Learning routes for subnets directly connected to the router
c. Learning routes, and putting those routes into the routing table, for routes advertised to the router by its
neighboring routers
d. Forwarding IP packets based on a packet’s destination IP address
9. A company implements a TCP/IP network, with PC1 sitting on an Ethernet LAN. Which of the
following protocols and features requires PC1 to learn information from some other server device?
a. ARP
b. ping
c. DNS
d. None of these answers is correct.
#####################################################################################
1. Which of the following header fields identify which TCP/IP application gets data received by the
computer? (Choose two answers.)
a. Ethernet Type
b. SNAP Protocol Type
c. IP Protocol
d. TCP Port Number
e. UDP Port Number
2. Which of the following are typical functions of TCP? (Choose four answers.)
a. Flow control (windowing)
b. Error recovery
c. Multiplexing using port numbers
d. Routing
e. Encryption
f. Ordered data transfer
4. What do you call data that includes the Layer 4 protocol header, and data given to Layer 4 by the
upper layers, not including any headers and trailers from Layers 1 to 3? (Choose two answers.)
a. L3PDU
b. Chunk
c. Segment
d. Packet
e. Frame
f. L4PDU
5. In the URI http://www.certskills.com/ICND1, which part identifies the web server?
a. http
b. www.certskills.com
c. certskills.com
d. http://www.certskills.com
e. The file name.html includes the hostname.
6. Fred opens a web browser and connects to the www.certskills.com website. Which of the following
are typically true about what happens between Fred’s web browser and the web server? (Choose two
answers.)
a. Messages flowing toward the server use UDP destination port 80.
b. Messages flowing from the server typically use RTP.
c. Messages flowing to the client typically use a source TCP port number of 80.
d. Messages flowing to the server typically use TCP.
#####################################################################################
1. In what modes can you type the command show mac address-table and expect to get a response
with MAC table entries? (Choose two answers.)
a. User mode
b. Enable mode
c. Global configuration mode
d. Interface configuration mode
2. In which of the following modes of the CLI could you type the command reload and expect the
switch to reboot?
a. User mode
b. Enable mode
c. Global configuration mode
d. Interface configuration mode
3. Which of the following is a difference between Telnet and SSH as supported by a Cisco switch?
a. SSH encrypts the passwords used at login, but not other traffic; Telnet encrypts nothing.
b. SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing.
c. Telnet is used from Microsoft operating systems, and SSH is used from UNIX and Linux operating systems.
d. Telnet encrypts only password exchanges; SSH encrypts all data exchanges.
4. What type of switch memory is used to store the configuration used by the switch when it is up
and working?
a. RAM
b. ROM
c. Flash
d. NVRAM
e. Bubble
5. What command copies the configuration from RAM into NVRAM?
a. copy running-config tftp
b. copy tftp running-config
c. copy running-config startup-config
d. copy startup-config running-config
e. copy startup-config running-config
f. copy running-config startup-config
6. A switch user is currently in console line configuration mode. Which of the following would place
the user in enable mode? (Choose two answers.)
a. Using the exit command once
b. Using the end command once
c. Pressing the Ctrl+Z key sequence once
d. Using the quit command
#####################################################################################
1. Which of the following statements describes part of the process of how a switch decides to forward
a frame destined for a known unicast MAC address?
a. It compares the unicast destination address to the bridging, or MAC address, table.
b. It compares the unicast source address to the bridging, or MAC address, table.
c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
d. It compares the destination IP address to the destination MAC address.
e. It compares the frame’s incoming interface to the source MAC entry in the MAC address table.
2. Which of the following statements describes part of the process of how a LAN switch decides to
forward a frame destined for a broadcast MAC address?
a. It compares the unicast destination address to the bridging, or MAC address, table.
b. It compares the unicast source address to the bridging, or MAC address, table.
c. It forwards the frame out all interfaces in the same VLAN except for the incoming interface.
d. It compares the destination IP address to the destination MAC address.
e. It compares the frame’s incoming interface to the source MAC entry in the MAC address table.
3. Which of the following statements best describes what a switch does with a frame destined for an
unknown unicast address?
a. It forwards out all interfaces in the same VLAN except for the incoming interface.
b. It forwards the frame out the one interface identified by the matching entry in the MAC address table.
c. It compares the destination IP address to the destination MAC address.
d. It compares the frame’s incoming interface to the source MAC entry in the MAC address table.
4. Which of the following comparisons does a switch make when deciding whether a new MAC
address should be added to its MAC address table?
a. It compares the unicast destination address to the bridging, or MAC address, table.
b. It compares the unicast source address to the bridging, or MAC address, table.
c. It compares the VLAN ID to the bridging, or MAC address, table.
d. It compares the destination IP addresses ARP cache entry to the bridging, or MAC address, table.
5. A Cisco Catalyst switch has 24 10/100 ports, numbered 0/1 through 0/24. Ten PCs connect to the
ten lowest numbered port, with those PCs working and sending data over the network. The other
ports are not connected to any device. Which of the following answers lists facts displayed by the
show interfaces status command?
a. Port Ethernet 0/1 is in a connected state.
b. Port Fast Ethernet 0/11 is in a connected state.
c. Port Fast Ethernet 0/5 is in a connected state.
d. Port Ethernet 0/15 is in a non-connected state.
##################################################################################
1. Imagine that you have configured the enable secret command, followed by the enable password
command, from the console. You log out of the switch and log back in at the console. Which command
defines the password that you had to enter to access privileged mode?
a. enable password
b. enable secret
c. Neither
d. The password command, if it is configured
2. An engineer wants to set up simple password protection with no usernames for some switches in
a lab, for the purpose of keeping curious co-workers from logging into the lab switches from their
desktop PCs. Which of the following commands would be a useful part of that configuration?
a. A login vty mode subcommand
b. A password password console subcommand
c. A login local vty subcommand
d. A transport input ssh vty subcommand
3. An engineer had formerly configured a Cisco 2960 switch to allow Telnet access so that the switch
expected a password of mypassword from the Telnet user. The engineer then changed the
configuration to support Secure Shell. Which of the following commands could have been part of the
new configuration? (Choose two answers.)
a. A username name secret password vty mode subcommand
b. A username name secret password global configuration command
c. A login local vty mode subcommand
d. A transport input ssh global configuration command
4. An engineer’s desktop PC connects to a switch at the main site. A router at the main site connects
to each branch office through a serial link, with one small router and switch at each branch. Which of
the following commands must be configured on the branch office switches, in the listed configuration
mode, to allow the engineer to telnet to the branch office switches? (Choose three answers.)
a. The ip address command in interface configuration mode
b. The ip address command in global configuration mode
c. The ip default-gateway command in VLAN configuration mode
d. The ip default-gateway command in global configuration mode
e. The password command in console line configuration mode
f. The password command in vty line configuration mode
5. A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan
shows that address 172.16.2.250 (with mask 255.255.255.0) is reserved for use by this new LAN
switch, and that 172.16.2.254 is already configured on the router connected to that same VLAN. The
switch needs to support SSH connections into the switch from any subnet in the network. Which of
the following commands are part of the required configuration in this case? (Choose two answers.)
a. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 1 configuration mode.
b. The ip address 172.16.2.250 255.255.255.0 command in interface vlan 2 configuration mode.
c. The ip default-gateway 172.16.2.254 command in global configuration mode.
d. The switch cannot support SSH because all its ports connect to VLAN 2, and the IP address must be
configured on interface VLAN 1.
6. Which of the following line subcommands tells a switch to wait until a show command’s output has
completed before displaying log messages on the screen?
a. logging synchronous
b. no ip domain-lookup
c. exec-timeout 0 0
d. history size 15
2. In which of the following modes of the CLI could you configure the duplex setting for interface Fast
Ethernet 0/5?
a. User mode
b. Enable mode
c. Global configuration mode
d. VLAN mode
e. Interface configuration mode
3. A Cisco Catalyst switch connects with its Gigabit0/1 port to an end user’s PC. The end user,
thinking the user is helping, manually sets the PC’s OS to use a speed of 1000 Mbps and to use full
duplex, and disables the use of autonegotiation. The switch’s G0/1 port has default settings for speed
and duplex. What speed and duplex settings will the switch decide to use? (Choose two answers.)
a. Full duplex
b. Half duplex
c. 10 Mbps
d. 1000 Mbps
4. Which of the following is required when configuring port security with sticky learning?
a. Setting the maximum number of allowed MAC addresses on the interface with the switchport port-security
maximum interface subcommand.
b. Enabling port security with the switchport portsecurity interface subcommand.
c. Defining the specific allowed MAC addresses using the switchport port-security mac-address interface
subcommand.
d. All the other answers list required commands.
5. A switch’s port Gi0/1 has been correctly enabled with port security. The configuration sets the
violation mode to restrict. A frame that violates the port security policy enters the interface, followed
by a frame that does not. Which of the following answers correctly describe what happens in this
scenario? (Choose two answers.)
a. The switch puts the interface into an err-disabled state when the first frame arrives.
b. The switch generates syslog messages about the violating traffic for the first frame.
c. The switch increments the violation counter for Gi0/1 by 1.
d. The switch discards both the first and second frame.
6. A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same
port security configuration, configured as follows:
Click here to view code image
interface range gigabitethernet 0/1 - 24
switchport mode access
switchport port-security
switchport port-security mac-address sticky
Which of the following answers describe the result of the port security configuration created with
these commands? (Choose two answers.)
a. Prevents unknown devices with unknown MAC addresses from sending data through the switch ports.
b. If a user connects a switch to the cable, prevents multiple devices from sending data through the port.
c. Will allow any one device to connect to each port, and will save that device’s MAC address into the startup-
config.
d. Will allow any one device to connect to each port, but will not save that device’s MAC address into the
startup-config.
1. Which of the following devices would be in the same collision domain as PC1?
a. PC2, which is separated from PC1 by an Ethernet hub
b. PC3, which is separated from PC1 by a transparent bridge
c. PC4, which is separated from PC1 by an Ethernet switch
d. PC5, which is separated from PC1 by a router
2. Which of the following devices would be in the same broadcast domain as PC1? (Choose three
answers.)
a. PC2, which is separated from PC1 by an Ethernet hub
b. PC3, which is separated from PC1 by a transparent bridge
c. PC4, which is separated from PC1 by an Ethernet switch
d. PC5, which is separated from PC1 by a router
3. In a two-tier campus LAN design, which of the following are typically true of the topology design?
(Choose two answers.)
a. The design uses a full mesh of links between access and distribution switches
b. The design uses a partial mesh of links between access and distribution switches
c. The design uses a partial mesh of links between the distribution and core switches
d. The end user and server devices connect directly to access layer switches
4. In a three-tier campus LAN design, which of the following are typically true of the topology design?
(Choose two answers.)
a. The design uses a partial mesh of links between access and distribution switches
b. The design uses a full mesh of links between access and distribution switches
c. The design uses a partial mesh of links between the distribution and core switches
d. The end user and server devices connect directly to distribution layer switches
5. Which one answer gives the strongest match between one part of a typical three-tier design with
the idea behind the listed generic topology design term?
a. The access layer looks like a partial mesh.
b. The distribution layer looks like a full mesh.
c. The distribution layer looks like a hybrid design.
d. The access layer looks like a star design.
2. Imagine a switch with three configured VLANs. How many IP subnets are required, assuming that all
hosts in all VLANs want to use TCP/IP?
a. 0
b. 1
c. 2
d. 3
e. You cannot tell from the information provided.
3. Switch SW1 sends a frame to switch SW2 using 802.1Q trunking. Which of the answers describes how
SW1 changes or adds to the Ethernet frame before forwarding the frame to SW2?
a. Inserts a 4-byte header and does change the MAC addresses
b. Inserts a 4-byte header and does not change the MAC addresses
c. Encapsulates the original frame behind an entirely new Ethernet header
d. None of the other answers are correct
4. Imagine that you are told that switch 1 is configured with the dynamic auto parameter for trunking on its
Fa0/5 interface, which is connected to switch 2. You have to configure switch 2. Which of the following settings
for trunking could allow trunking to work?
(Choose two answers.)
a. on
b. dynamic auto
c. dynamic desirable
d. access
e. None of the other answers are correct.
5. A switch has just arrived from Cisco. The switch has never been configured with any VLANs, but VTP has
been disabled. An engineer gets into configuration mode and issues the vlan 22 command, followed by the
name Hannahs-VLAN command. Which of the following are true? (Choose two answers.)
a. VLAN 22 is listed in the output of the show vlan brief command.
b. VLAN 22 is listed in the output of the show running-config command.
c. VLAN 22 is not created by this process.
d. VLAN 22 does not exist in that switch until at
least one interface is assigned to that VLAN.
6. Which of the following commands identify switch interfaces as being trunking interfaces: interfaces that
currently operate as VLAN trunks? (Choose two answers.)
a. show interfaces
b. show interfaces switchport
c. show interfaces trunk
d. show trunks
Answers to the “Do I Know This Already?” quiz:
1 B 2 D 3 B 4 A, C 5 A, B 6 B, C
1. Which answers describe a good practice in applying good troubleshooting methodologies? (Choose two
answers.)
a. Perform problem isolation as fast as possible, including not slowing down to document your findings.
b. The last step in a good troubleshooting process should be to take action to resolve the root cause of the
problem.
c. The last step in a good troubleshooting process should include monitoring the status to ensure that the
problem is indeed solved and does not recur.
d. Each worker should know and use the escalation process when they cannot resolve a particular problem.
3. Which of the following are true about IP address 172.16.99.45’s IP network? (Choose two answers.)
a. The network ID is 172.0.0.0.
b. The network is a Class B network.
c. The default mask for the network is 255.255.255.0.
d. The number of host bits in the unsubnetted network is 16.
4. Which of the following are true about IP address 192.168.6.7’s IP network? (Choose two answers.)
a. The network ID is 192.168.6.0.
b. The network is a Class B network.
c. The default mask for the network is 255.255.255.0.
d. The number of host bits in the unsubnetted network is 16.
3. Which of the following answers lists the dotteddecimal notation (DDN) equivalent of /30?
a. 255.255.255.192
b. 255.255.255.252
c. 255.255.255.240
d. 255.255.254.0
e. 255.255.255.0
4. Working at the help desk, you receive a call and learn a user’s PC IP address and mask (10.55.66.77,
mask 255.255.255.0). When thinking about this using classful logic, you determine the number of network
(N), subnet (S), and host (H) bits. Which of the following is true in this case?
a. N=12
b. S=12
c. H=8
d. S=8
e. N=24
5. Working at the help desk, you receive a call and learn a user’s PC IP address and mask (192.168.9.1/27).
When thinking about this using classful logic, you determine the number of network (N), subnet (S), and host
(H) bits. Which of the following is true in this case?
a. N=24
b. S=24
c. H=8
d. H=7
7. Which of the following masks, when used as the only mask within a Class B network, would supply enough
subnet bits to support 100 subnets? (Choose two.)
a. /24
b. 255.255.255.252
c. /20
d. 255.255.252.0
Answers to the “Do I Know This Already?” quiz:
1 C 2 B 3 B 4 C 5 A 6 D 7 A, B
3. Router 1 has a Fast Ethernet interface 0/0 with IP address 10.1.1.1. The interface is connected to a switch.
This connection is then migrated to use 802.1Q trunking. Which of the following commands could be part of
a valid configuration for Router 1’s Fa0/0 interface? (Choose two answers.)
a. interface fastethernet 0/0.4
b. dot1q enable
c. dot1q enable 4
d. trunking enable
e. trunking enable 4
f. encapsulation dot1q 4
4. A Layer 3 switch has been configured to route IP packets between VLANs 1, 2, and 3, which connect to
subnets 172.20.1.0/25, 172.20.2.0/25, and 172.20.3.0/25, respectively. The engineer issues a show ip route
command on the Layer 3 switch,
listing the connected routes. Which of the following answers lists a piece of information that should be in at
least one of the routes?
a. Interface Gigabit Ethernet 0/0.3
b. Next-hop router 172.20.4.1
c. Interface VLAN 2
d. Mask 255.255.255.0
5. An engineer configures a static IPv4 route on Router R1. Which of the following pieces of information
should not be listed as a parameter in the configuration command that creates this static IPv4 route?
a. The destination subnet’s subnet ID
b. The next-hop router’s IP address
c. The next-hop router’s neighboring interface
d. The subnet mask
7. A network engineer configures the ip route 10.1.1.0 255.255.255.0 s0/0/0 command on a router, and then
issues a show ip route command from enable mode.
No routes for subnet 10.1.1.0/24 appear in the output. Which of the following could be true?
a. The ip route command has incorrect syntax and was rejected in config mode.
b. interface s0/0/0 is down.
c. The router has no up/up interfaces in Class A network 10.0.0.0.
d. The ip route command is missing a next-hop router IP address.
2. Which of the following best describes the concept of the RIP hop count metric?
a. The number of satellite links in a route.
b. The number of routers between a router and a subnet, not counting that router.
c. The number of routers between a router and a subnet, counting that router.
d. The number of links between a router and a subnet, not counting the link where the subnet resides.
e. The number of links between a router and a subnet, counting the link where the subnet resides.
3. Router R2 has interfaces with addresses/masks of 10.1.1.2/24 and 11.1.1.2/24. Which of the
following commands would be part of a RIP Version 2 configuration on R2 that enables RIPv2 on both
interfaces? (Choose three answers.)
a. router rip
b. router rip 3
c. network 10.0.0.0
d. network 10.1.1.1
e. network 11.0.0.0
f. network 11.1.1.2
4. Which of the following network commands, following a router rip command, would cause RIP to
send updates out two interfaces whose IP addresses are 10.1.2.1 and 10.1.1.1, mask 255.255.255.0?
a. network 10.0.0.0
b. network 10.1.1.0 10.1.2.0
c. network 10.1.1.1. 10.1.2.1
d. network 10.1.0.0 255.255.0.0
e. network 10
7. Routers R1 and R2 use RIPv2, and should exchange routes with each other. R1 and R2 connect on
an Ethernet link, with both routers using their G0/0 interfaces. R2 learns routes from R1, but R1 does
not learn routes from R2. Which of the following mistakes could result in this symptom?
a. R2 has configured a passive-interface gigabitethernet0/0 command.
b. R1’s and R2’s IP address/mask values are 10.1.1.1/25 and 10.1.1.201/25, respectively.
c. R1’s has no RIP network command that matches R1’s G0/0 interface IP address.
d. R2 is missing a no autosummary command.
1. A PC connects to a LAN and uses DHCP to lease an IP address for the first time. Of the usual four DHCP
messages that flow between the PC and the DHCP server, which ones do the client send? (Choose two
answers.)
a. Acknowledgment
b. Discover
c. Offer
d. Request
2. An enterprise puts the DHCP and DNS servers on VLAN 10/subnet 10 in Atlanta, using IP address
10.1.10.1 for the DHCP server and 10.1.10.2 for the DNS server. A remote router sits in Boston, with devices
on the Boston LAN using the DHCP and DNS servers in Atlanta. Which of the following needs to be configured
in the routers in this enterprise to support DHCP and DNS?
a. The ip helper-address 10.1.10.1 command in the Atlanta router
b. The ip helper-address 10.1.10.2 command in the Boston router
c. The ip name-server 10.1.10.2 command in the Atlanta router
d. The ip dhcp-server 10.1.10.1 command in the Boston router
e. None of the other answers are correct.
3. Fred decides to migrate from an old DHCP server platform to use a Cisco router at the headquarters
building. This DHCP server, created with
configuration in IOS on a Cisco router, supports 200
remote subnets. Which of the following settings are
made outside of a per-subnet pool of addresses?
a. Client IP address
b. Addresses in that subnet excluded from being
leased by the server
c. Default router
d. DNS server
e. Length of address lease
4. PC1, a new PC, just booted for the first time when
connected to an enterprise network. PC1 used DHCP
to lease IP address 10.1.1.1, learning mask
255.255.255.0, DNS server 10.9.9.9, and default
gateway 10.1.1.2, with a lease time of 7 days.
Assume that the PC has sent nothing else over the
network because the DHCP process completed. The
user then opens a web browser and types
www.ciscopress.com. Which of the following
actions happens next?
a. PC1 sends an ARP request to find the web
server’s MAC address.
b. PC1 sends an ARP request to find the default
gateway’s (10.1.1.2) MAC address.
c. PC1 sends a DNS request about
www.ciscopress.com to the DNS server
(10.9.9.9).
d. PC1 sends an IP packet to the
www.ciscopress.com web server IP address.
6. A packet is sent to a destination address. That single packet is replicated by a few routers based on the
routers’ knowledge of hosts that had earlier registered to receive packets sent to that destination address.
The routers do not forward copies of the packet onto subnets where no hosts have registered, and do forward
copies of the packet onto subnets where at least one host has registered to receive those packets. Which of
the following IP address types was used as the destination IP address?
a. A unicast address
b. A network broadcast address
c. A subnet broadcast address
d. A multicast address
3. An engineer has planned to use Class B network 172.19.0.0 and a single subnet mask throughout the
network. The answers list the masks considered by the engineer. Choose the mask that, among the answers,
supplies the largest number of hosts per subnet, while also supplying enough subnet bits to support 1000
subnets.
a. 255.255.255.0
b. /26
c. 255.255.252.0
d. /28
4. An engineer has calculated the list of subnet IDs, in consecutive order, for network 172.30.0.0, assuming
that the /22 mask is used throughout the network.
Which of the following are true? (Choose two answers.)
a. Any two consecutive subnet IDs differ by a value of 22 in the third octet.
b. Any two consecutive subnet IDs differ by a value of 16 in the fourth octet.
c. The list contains 64 subnet IDs.
d. The last subnet ID is 172.30.252.0.
5. Which of the following are valid subnet IDs for network 192.168.9.0 using mask /29, assuming that mask
/29 is used throughout the network?
a. 192.168.9.144
b. 192.168.9.58
c. 192.168.9.242
d. 192.168.9.9
6. Which of the following is not a valid subnet ID for network 172.19.0.0 using mask /24, assuming that mask
/24 is used throughout the network?
a. 172.19.0.0
b. 172.19.1.0
c. 172.19.255.0
d. 172.19.0.16
Answers to the “Do I Know This Already?” quiz:
1A
2B
3B
4 C, D
5A
6D
1. Which of the following routing protocols support VLSM? (Choose three answers.)
a. RIPv1
b. RIPv2
c. EIGRP
d. OSPF
3. R1 has configured interface Fa0/0 with the ip address 10.5.48.1 255.255.240.0 command. Which of the
following subnets, when configured on another interface on R1, would not be considered an
overlapping VLSM subnet?
a. 10.5.0.0 255.255.240.0
b. 10.4.0.0 255.254.0.0
c. 10.5.32.0 255.255.224.0
d. 10.5.0.0 255.255.128.0
4. R4 has a connected route for 172.16.8.0/22. Which of the following answers lists a subnet that overlaps
with this subnet?
a. 172.16.0.0/21
b. 172.16.6.0/23
c. 172.16.16.0/20
d. 172.16.11.0/25
5. A design already includes subnets 192.168.1.0/26, 192.168.1.128/30, and 192.168.1.160/29. Which of the
following subnets is the numerically lowest subnet ID that could be added to the design, if you wanted to add
a subnet that uses a /28 mask?
a. 192.168.1.144/28
b. 192.168.1.112/28
c. 192.168.1.64/28
d. 192.168.1.80/28
e. 192.168.1.96/28
Answers to the “Do I Know This Already?” quiz:
1 B, C, D
2A
3A
4D
5C
4. In a router running a recent IOS version (at least version 15.0), an engineer needs to delete the
second line in ACL 101, which currently has four commands configured. Which of the following
options could be used? (Choose two answers.)
a. Delete the entire ACL and reconfigure the three ACL statements that should remain in the ACL.
b. Delete one line from the ACL using the no access-list... global command.
c. Delete one line from the ACL by entering ACL configuration mode for the ACL and then deleting only the
second line based on its sequence number.
d. Delete the last three lines from the ACL from global configuration mode, and then add the last two
statements back into the ACL.
5. An engineer is considering configuring an ACL on Router R1. The engineer could use ACL A which would
be enabled with the ip access-group A out command on interface G0/1, or ACL B, which would be enabled
with the ip access-group B in
command on that same interface. R1’s G0/1 interface uses IPv4 address 1.1.1.1. Which of the answers is
true when comparing these options? (Choose two answers.)
a. ACL A creates more risk of filtering important overhead traffic than ACL B.
b. ACL B creates more risk of filtering important overhead traffic than ACL A.
c. A ping 1.1.1.1 command on R1 would bypass ACL A even if enabled.
d. A ping 1.1.1.1 command on R1 would bypass ACL B even if enabled.
6. An engineer configures an ACL but forgets to save the configuration. At that point, which of the following
commands displays the configuration of an IPv4 ACL, including line numbers? (Choose two answers.)
a. show running-config
b. show startup-config
c. show ip access-lists
d. show access-lists
Answers to the “Do I Know This Already?” quiz:
1 E, F
2 A, E
3E
4 A, C
5 B, C
6 C, D
1. Which of the following was a short-term solution to the IPv4 address exhaustion problem?
a. IP version 6
b. IP version 5
c. NAT/PAT
d. ARP
2. A router receives an Ethernet frame that holds an IPv6 packet. The router then makes a decision to route
the packet out a serial link. Which of the following statements is true about how a router forwards an IPv6
packet?
a. The router discards the Ethernet data-link header and trailer of the received frame.
b. The router makes the forwarding decision based on the packet’s source IPv6 address.
c. The router keeps the Ethernet header, encapsulating the entire frame inside a new IPv6 packet before
sending it over the serial link.
d. The router uses the IPv4 routing table when choosing where to forward the packet.
4. When subnetting an IPv6 address block, an engineer shows a drawing that breaks the address structure
into three pieces. Assuming that all subnets use the same prefix length, which of the following answers lists
the name of the field on the far right side of the address?
a. Subnet
b. Interface ID
c. Network
d. Global routing prefix
e. Subnet router anycast
4. Router R1 has an interface named Gigabit Ethernet 0/1, whose MAC address has been set to
0200.0001.000A. The interface is then configured with the ipv6 address 2001:1:1:1:200:FF:FE01:B/64
interface subcommand; no other ipv6 address commands are
configured on the interface. Which of the following answers lists the link local address used on the
interface?
a. FE80::FF:FE01:A
b. FE80::FF:FE01:B
c. FE80::200:FF:FE01:A
d. FE80::200:FF:FE01:B
6. Three routers connect to the same VLAN and IPv6 subnet. All three routers have sent NDP RA messages,
in reply to various IPv6 hosts’ NDP RS messages, asking to learn about the available IPv6 routers in the
subnet. A network engineer issues the show ipv6 neighbors command on R1. Which of the answers best
describes the kind of NDP information held in this output?
a. IPv6 neighbors (both routers and hosts) plus their MAC addresses, without noting which are routers
b. IPv6 neighbors (both routers and hosts) plus their MAC addresses, and also noting which are routers
c. IPv6 routers, with no information about nonrouters, with no MAC address info
d. IPv6 routers, with no information about nonrouters, with MAC address info
1. A router has been configured with the ipv6 address 2000:1:2:3::1/64 command on its G0/1 interface as
shown in the figure. The router creates a link-local address of FE80::FF:FE00:1 as well. The interface is
working. Which of the following routes will the router add to its IPv6 routing table? (Choose two answers.)
a. A route for 2000:1:2:3::/64
b. A route for FE80::FF:FE00:1/64
c. A route for 2000:1:2:3::1/128
d. A route for FE80::FF:FE00:1/128
2. A router has been configured with the ipv6 address 3111:1:1:1::1/64 command on its G0/1 interface and
ipv6 address 3222:2:2:2::1/64 on its G0/2 interface. Both interfaces are working. Which of the following
routes would you expect to see in the
output of the show ip route connected command? (Choose two answers.)
a. A route for 3111:1:1:1::/64
b. A route for 3111:1:1:1::1/64
c. A route for 3222:2:2:2::/64
d. A route for 3222:2:2:2::2/128
3. An engineer needs to add a static IPv6 route for prefix 2000:1:2:3::/64 to Router R5’s configuration, in the
figure shown with question 1. Which of the following answers shows a valid static IPv6 route for that subnet,
on Router R5?
a. ipv6 route 2000:1:2:3::/64 S0/1/1
b. ipv6 route 2000:1:2:3::/64 S0/1/0
c. ip route 2000:1:2:3::/64 S0/1/1
d. ip route 2000:1:2:3::/64 S0/1/0
6. A switch is cabled to a router whose host name is Hannah. Which of the following LLDP commands could
identify Hannah’s model of hardware? (Choose two answers.)
a. show neighbors
b. show neighbors Hannah
c. show lldp
d. show lldp interface
e. show lldp neighbors
f. show lldp entry Hannah
1. An engineer needs to put a new IOS image into a router’s flash memory as part of an IOS upgrade.
Which of the following could the engineer do to move files into the router?
a. Use the copy ftp flash command to copy files into flash using FTP.
b. Use the copy flash tftp command to copy files using TFTP into flash.
c. Use the copy scp flash command to copy files into flash using SCP.
d. Use the ios restore command to copy files into flash from the file archive.
2. What is the first step a typical Cisco router takes during the boot process when attempting to locate
an operating system to load?
a. The router looks for an image on a TFTP server.
b. The router checks its configuration register boot field.
c. The router boots to ROMMON.
d. The router looks in flash memory for a Cisco IOS image file.
3. After your Cisco router boots, what is a simple way to verify the Cisco IOS image that was loaded
and the location from which it was copied into RAM?
a. show running-config
b. show boot
c. show cisco ios
d. show version
4. Which value in the configuration register controls how the router boots?
a. The third hexadecimal character
b. The second hexadecimal character
c. The first hexadecimal character
d. The last hexadecimal character
5. You have forgotten your privileged mode password and cannot access global configuration mode.
During the password recovery process, how can you change the configuration register if you cannot
remember enough passwords to get into configuration mode of the router?
a. Using ROMMON mode
b. Using the Setup Utility
c. Using the GUI for configuring the device
d. Using password reset mode
6. What type of router memory is used to store the configuration used by the router when it is up and
working?
a. RAM
b. ROM
c. Flash
d. NVRAM
7. An engineer has made dozens of configuration changes to a router’s configuration in the previous
hour. The engineer wants to revert back to a configuration that he had previously saved to an external
FTP server. Which facilities would allow the engineer to go back to using the exact same running
configuration that the router had an hour ago without reloading the router?
a. Use the copy ftp running-config command
b. Use the copy ftp startup-config command
c. Use the archive restore ftp command
d. Use the config replace command
1. Imagine a Cisco router model X. Cisco produced IOS software for this model of router such that its
customer could pay for baseline features, additional data features, additional voice features, and
additional security features. With this traditional method of software production from Cisco, for a
single IOS version, how many IOS images would be available for this one router model X?
a. 1
b. 2
c. 3
d. >3
2. What is the name of the new Cisco IOS image file that provides access to all major IOS features?
a. Universal
b. Full
c. Complete
d. Enhanced
3. What command enables you to show the UDI of your Cisco router?
a. show udi
b. show license udi
c. show base udi
d. show udi base
4. Which of the following answers lists a CLI command on a router that is useful when installing a
paid-for technology package license onto a 2901 router that uses Cisco IOS licensing and an IOS
universal image?
a. license boot module c2900 technology-package technology-package
b. license boot module technology-package technology-package install
c. license install url technology-package
d. license install url
5. Which of the following answers lists a CLI command on a router that is useful when installing a
right-to-use license onto a 2901 router that uses Cisco IOS licensing and an IOS universal image?
a. license boot module c2900 technology-package technology-package
b. license boot module technology-package technology-package install
c. license install url technology-package
d. license install url