CCNA v 1

Is this your test? Login to manage it. If not, you can build a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which IP address and wildcard mask combination can be used in an ACL statement to match the 172.16.0.0/30 network?
2.
1 point
Refer to the exhibit. A host connected to Fa0/0 is unable to acquire an IP address from the DHCP server. The output of the debug ip dhcp server command shows “DHCPD: there is no address pool for 192.168.3.17″. What is the problem?
3.
1 point
What function does LCP perform in the establishment of a PPP session?
4.
1 point
Refer to the exhibit. A network administrator has issued the commands that are shown on Router1 and Router2. A later review of the routing tables reveals that neither router is learning the LAN network of the neighbor router. What is most likely the problem with the RIPng configuration?




5.
1 point
A network administrator has changed the VLAN configurations on his network switches over the past weekend. How can the administrator determine if the additions and changes improved performance and availability on the company intranet?
6.
1 point
What is the result when the command security passwords min-length 8 is entered into a router?
7.
1 point
What type of ACL can be used to force a user to authenticate to the router before accessing a network?
8.
1 point
A company is looking for a WAN solution to connect its headquarters site to four remote sites. What are two advantages that dedicated leased lines provide compared to a shared Frame Relay solution? (Choose two.)
9.
1 point
Which technology is used to dynamically map next hop, network layer addresses to virtual circuits in a Frame Relay network?
10.
1 point
Which two configurations must be completed before an RSA key can be generated on a router? (Choose two.)
11.
1 point
A company has its headquarters office in Dallas and five branch offices located in New York, Chicago, Los Angeles, Seattle, and Atlanta. WAN links are used for communications among offices in six sites. In planning the WAN links, the network designer is given two requirements: (1) minimize cost and (2) provide a certain level of WAN link reliability with redundant links. Which topology should the network designer recommend?
12.
1 point
Refer to the exhibit. Partial results of the show access-lists and show ip interface FastEthernet 0/1 commands for router Router1 are shown. There are no other ACLs in effect. Host A is unable to telnet to host B. Which action will correct the problem but still restrict other traffic between the two networks?
13.
1 point
Which statement about a VPN is true?
14.
1 point
Refer to the exhibit. The corporate network that is shown has been assigned network 172.16.128.0/19 for use at branch office LANs. If VLSM is used, what mask should be used for addressing hosts at Branch4 with minimal waste from unused addresses?
15.
1 point
What component of VPN technology combines message text with a key to make the message unreadable by unauthorized receivers?
16.
1 point
What is an accurate description of CHAP when used with PPP on a serial connection between two routers?
17.
1 point
Refer to the exhibit. R1 is performing NAT overload for the 10.1.1.0/24 inside network. Host A has sent a packet to the web server. What is the destination IP address of the return packet from the web server?
18.
1 point
A technician is talking to a colleague at a rival company and comparing DSL transfer rates between the two companies. Both companies are in the same city, use the same service provider, and have the same rate/service plan. What is the explanation for why company 1 reports higher download speeds than company 2 reports?
19.
1 point
Refer to the exhibit. Every time the administrator reboots this router, the boot process ends in setup mode. What is a possible problem?
20.
1 point
While troubleshooting a problem with an e-mail server, an administrator observes that the switch port used by the server shows “up, line protocol up”. The administrator cannot ping the server. At which layer of the OSI model is the problem most likely to be found?
21.
1 point
Which statement accurately describes a role that is played in establishing a WAN connection?
22.
1 point
Refer to the exhibit. A network administrator is trying to backup the IOS software on R1 to the TFTP server. He receives the error message that is shown in the exhibit, and cannot ping the TFTP server from R1. What is an action that can help to isolate this problem?
23.
1 point
Refer to the exhibit. What is the meaning of the term dynamic in the output of the command?
24.
1 point
Refer to the exhibit. What is placed in the address field in the header of a frame that will travel from the Orlando router to the DC router?
25.
1 point
Refer to the exhibit. Headquarters is connected through the Internet to branch office A and branch office B. Which WAN technology would be best suited to provide secure connectivity between headquarters and both branch offices?
26.
1 point
Which variable is permitted or denied by a standard access control list?
protocol type
27.
1 point
Which three guidelines would help contribute to creating a strong password policy? (Choose three.)
28.
1 point
Refer to the exhibit. Users who are connected to R1 report that they are unable to establish connectivity to the users who are connected to router R2. A network administrator tests the link with the debug ppp authentication command. Based on the output shown, which statement correctly defines the problem on the link?
29.
1 point
Compared with IDS systems, what can IPS systems do to provide further protection of computer systems?
30.
1 point
What name is given to the location where a customer network interfaces with a network that is owned by another organization?
31.
1 point
Which data link layer encapsulation protocol is used by default for serial connections between two Cisco routers?
32.
1 point
Refer to the exhibit. RIPv2 has been configured on all routers in the network. Routers R1 and R3 have not received any RIP routing updates. What will fix the issue?
33.
1 point
An administrator issues the command show interfaces s0/1/0 on a router that is configured for Frame Relay. Which console output may indicate an LMI mismatch?
34.
1 point
What will be the result of adding the command ip dhcp excluded-address 10.10.4.1 10.10.4.5 to the configuration of a local router that has been configured as a DHCP server?
35.
1 point
Refer to the exhibit. The link between the CTRL and BR_1 routers is configured as shown in the exhibit. Why are the routers unable to establish a PPP session?
36.
1 point
Which combination of authentication and Layer 2 protocol should be used to establish a link between a Cisco and a non-Cisco router without sending authentication information in plain text?
37.
1 point
The 192.168.3.17 address has not been excluded from the 192Network pool.
38.
1 point
A DHCP server is configured with a block of excluded addresses. What two devices would be assigned static addresses from the excluded address range? (Choose two.)
39.
1 point
What is the result when the command permit tcp 10.25.132.0 0.0.0.255 any eq smtp is added to a named access control list and applied on the inbound interface of a router?
40.
1 point
Because of a remote-procedure call failure, a user is unable to access an NFS server. At what layer of the TCP/IP model does this problem occur?
41.
1 point
An administrator is configuring a dual stack router with IPv6 and IPv4 using RIPng. The administrator receives an error message when trying to enter the IPv4 routes into RIPng. What is the cause of the problem?
42.
1 point
Refer to the exhibit. The network administrator creates a standard access control list to prohibit traffic from the 192.168.1.0/24 network from reaching the Internet. The access list must still permit the 192.168.1.0/24 network access to the 192.168.2.0 network. On which router interface and in which direction should the access control list be applied?
43.
1 point
An employee of XYZ corporation will begin working from home. The employee has a choice of DSL or cable technology for WAN connectivity. Which connectivity characteristic is accurately described?
44.
1 point
What are two main components of data confidentiality? (Choose two.)
45.
1 point
What functionality do access control lists provide when implementing dynamic NAT on a Cisco router?
46.
1 point
Refer to the exhibit. Communication between two peers has failed. Based on the output that is shown, what is the most likely cause?
47.
1 point
An administrator is unable to receive e-mail. While troubleshooting the problem, the administrator is able to ping the local mail server IP address successfully from a remote network and can also successfully ping using the mail server name. At which layer of the OSI model is the problem most likely to be found?
48.
1 point
Which option represents a best practice for applying ACLs?
49.
1 point
Which network component has the primary function of detecting and logging attacks made against the network?
50.
1 point
Refer to the exhibit. A network administrator is trying to connect R1 remotely to make configuration changes. Based on the exhibited command output, what will be the result when attempting to connect to R1?