Certified Network Associate


1. You need to copy the current system image file from the router to the network server, so you type "copy flash tftp" from the privileged EXEC mode. As the file is copying you need to cancel the copy, what series of keys will allow you to do this?

A. Ctrl + ^+6
B. Ctrl + s
C. Ctrl + h
D. Alt + ^

>> !
Answer: A

The key sequence Ctrl + ^ will cancel the copy from flash memory.


2. You are copying a new system image file to your router from a tftp server because the present file has become corrupted. While the file is copying, you see a series of exclamation points. What do these mean?

A. Each exclamation point (!) means that one UDP segment has successfully transferred.
B. Each exclamation point (!) means that one TCP segment has successfully transferred.
C. Each exclamation point (!) means that there has been a successful check run verification on a segment.
D. The exclamation point is for informational purposes only and has no real significance.

>> !
Answer: A

Each exclamation point (!) means that one UDP segment has successfully transferred. Each V means that there has been a successful check run verification on a segment.


3. How do you cause a router to enter setup mode? (Choose all that apply)

A. Type "setup" at the Router# prompt.
B. If the router is new or if NVRAM is corrupted, the router will automatically enter setup mode.
C. The router is always in setup mode.
D. You can't force the router to enter setup mode.

>> !
Answer: A & B

When you enter the keywords "setup" at the router# prompt, you will enter setup mode. Also a corrupt or new software installation will automatically default to the router setup program.


4. Cisco Discovery Protocol (CDP) can discover any directly connected routers. On which OSI model layer does it work?

A. Datalink
B. Physical
C. Network
D. Session
E. Presentation

>> !
Answer: A

The Cisco Discovery Protocol (CDP) operates at the datalink layer of the OSI reference model. CDP is used by Cisco internetworking devices to advertise its location and existence in the network.


5. The physical media that support ______ can connect CDP devices.

A. SNAP
B. TCP/IP
C. Novell IPX
D. AppleTalk

>> !
Answer: A

SNAP (Subnetwork Access Protocol) works on the physical, the other protocols work on high layers.


6. You are an administrator connected to Router 1, which in turn is directly connected to Router 2 and Router 3. Router 4 is directly connected to Router 3. You need to obtain information from Router 4. How would you go about it?

A. telnet to Router 4
B. use CDP
C. type running-config
D. telnet to Router 3

>> !
Answer: A

CDP only works on directly connected routers so you would have to use a higherlayer-protocol tool, such as telnet, to connect to the remote device.


7. You need to disable CDP on your router. How would you do this?

A. Type "no cdp run" at the Router(config)# prompt
B. Type "no cdp run" at the Router(config-if)# prompt
C. Type "no cdp enable" at the Router(config)# prompt
D. Type "no cdp run" at the Router(config)# prompt Type "no cdp enable" at the Router(config-if)# prompt to disable CDP on an interface. By default, CDP is automatically enabled on a router and its interfaces

>> !
Answer: A


8. You need to disable CDP on a specific router interface. How would you do this?

A. Type "no cdp run" at the Router(config)# prompt
B. Type "no cdp run" at the Router(config-if)# prompt
C. Type "no cdp enable" at the Router(config-if)# prompt
D. Type "no cdp enable" at the Router(config)# prompt

>> !
Answer: C

Type "no cdp run" at the Router(config)# prompt Type "no cdp enable" at the Router(config-if)# prompt to disable CDP on an interface. By default, CDP is automatically enable on a router and its interfaces.


9. CDP, by default, is set to discard CDP packets from other routers after 180 seconds. You have a network that has frequent changes to the router configuration files. What should you do to have the receiving routers purge information quicker?

A. Configure the CDP holdtime to be less than the CDP timer does.
B. Configure the CDP holdtime to be more that the CDP timer.
C. Configure the CDP holdtime to equal the CDP timer.
D. Type no CDP holdtime.

>> !
Answer: A

The default for the CDP timer is 60 seconds. To configure quicker updates, set the CDP holdtime to less than the CDP timer did.


10. You have decreased the CDP time to 30 seconds, what impact will this have on your network? (Choose all that apply)

A. Router updates are quicker.
B. Bandwidth usage will increase.
C. Bandwidth usage will decrease.
D. Router updates are slower.

>> !
Answer: A & B

Router updates will be quicker but bandwidth usage will increase.


11. What is the correct prompt and command to configure the CDP timer?

A. cdp timer [seconds] at the Router# prompt.
B. cdp timer [seconds] at the Router(config)# prompt.
C. cdp holdtime [seconds] at the Router# prompt.
D. cdp timer [seconds] at the Router(config-if)# prompt.

>> !
Answer: B

The Cisco IOS global configuration command "cdp timer 'seconds' " will specify how often the router will send CDP (Cisco Discovery Protocol) updates.


12. How do you find out information about other CDP devices that are connected to you?

A. Type "show cdp neighbors" at the Router# prompt.
B. Type "show cdp devices" at the Router# prompt.
C. Type "show cdp" at the Router# prompt.
D. Type "show cdp neighbors" at the Router(config)# prompt.

>> !
Answer: A

The Cisco IOS privileged EXEC command "show cdp neighbors" will display information about neighboring routers connected on your network.


13. You have entered the command "show cdp entry routerB" at the Router# prompt. No information is returned, what could cause this?

A. The router's name is RouterB.
B. You should have entered "cdp entry routerB.cisco.com"
C. You should have entered "cdp routerB.cisco.com"
D. You should have entered "cdp routerB"

>> !
Answer: A


14. The following selections show the command prompt and the configuration of the IP network mask. Which two are correct?

A. Router#term IP netmask-format { bitcount | decimal | hexadecimal }
B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal }
C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal }
D. Router#ip netmask-format { bitcount | decimal | hexadecimal }

>> !
Answer: A & B


15. How would you configure one host name that points to two IP addresses?

A. IP host P1R1 1.0.0.5 2.0.0.8
B. IP P1R1 1.0.0.5 2.0.0.8
C. IP host P1R1 1.0.0.5
D. IP host duplicate "all"

>> !
Answer: A

The correct syntax is IP host name [ TCP-port-number ] address [ address ]..... So, "IP host P1R1 1.0.0.5 2.0.0.8" is the correct choice. "IP host P1R1 1.0.0.5" only points the host name P1R1 to one IP address--1.0.0.5.


16. As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command?

A. 6
B. 1
C. 2
D. 4

>> !
Answer: A

You can only specify six name servers in one command. The syntax is "IP name-server server-address1 [[ server-address2 ]...server-address6]. You must also enable DNS.


17. You have typed "ping" 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the "." signify?

A. That one message was successful.
B. That all messages were successful.
C. That one message timed out.
D. That one message completed in under the allotted timeframe.

>> !
Answer: C

The possible responses from the ping command are: ! Successful receipt of an echo reply. . Timed out waiting for a reply U Destination unreachable C Congestion-experienced packet I Ping interrupted ? Packet type unknown & Packet TTL exceeded.


18. You are logged into the Jackson router, what command would show you the IP addresses of routers connected to you?

A. show cdp
B. show run
C. show neighbors
D. show cdp neighbors detail

>> !
Answer: D


19. Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from ______.

A. RIP
B. IGRP
C. IP
D. TCP

>> !
Answer: B

The quality of information is rated: Connected interface 0 Static route 1 IGRP 100 RIP 120 Unknown 255 The lower the value, the more reliable the source with 255 signifying information that the router will ignore. So, the router will use IGRP, rated at 100, before RIP, rated at 120.


20. The command "show IP protocol" displays which information? (Choose all that apply)

A. routing timers
B. network information
C. contents of the IP routing table
D. information about all known network and subnetworks

>> !
Answer: A & B

"show IP protocol" displays routing timers and network information. "show IP route" displays the routing table with information about all known networks and subnetworks.


21. IGRP uses flash updates, poison reverse updates, holddown times, and split horizon. How often does it broadcast its routing table updates?

A. 10 seconds
B. 90 seconds
C. 30 seconds
D. 45 seconds

>> !
Answer: B

The Interior Gateway Routing Protocol (IGRP) will broadcast it's entire routing table to all directly connected neighbors every 90 seconds.


22. What is the Cisco name for the encapsulation type used on a serial interface?

A. HDLC
B. SDLC
C. SAP
D. SNAP

>> !
Answer: A

High-Level Data Link Control (HDLC) is a datalink layer protocol that specifies a data encapsulation method for serial links.


23. What is the method used by Cisco routers to identify packets for encryption?

A. Category lists
B. Access lists
C. Filtered lists
D. Cisco normal event listing

>> !
Answer: B

Cisco routers use access lists to identify packets for priority or custom queueing, restrict or reduce the contents of routing updates, provide IP traffic dynamic access control with enhanced user authentication using the lock-and-key feature, identify packets for encryption, and identify Telnet access allowed to the router virtual terminals. The Access list enable you to identify packets for priority or customer queuing, restrict or reduce the contents of routing updates, provide IP traffic dynamic access control with enhanced user authentication using the lock-and-key feature. Identify packets for encryption, and Identify Telnet access allowed to the outer virtual terminals.


24. What are the two types of access lists that can be configured on a Cisco router?

A. Standard
B. Extended
C. Filtering
D. Packet

>> !
Answer: A & B

The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc.


25. What is the function of DDR on Cisco routers?

A. DDR is dial--on-demand routing. It provides a continuous LAN only connection.
B. DDR is dial-on-demand routing. It provides routing for high volume traffic.
C. DDR is dial--on-demand routing. It provides a continuous WAN connection.
D. DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.

>> !
Answer: D

DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a remote site when there is traffic to transmit.


26. Select the fields for the Cisco HDLC protocol.

A. Flag, Address, Control
B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag
C. Flag, Address, Control, Data, FCS, Flag
D. Flag, Address, Control, Proprietary, Data, FCS, Flag

>> !
Answer: D

The Cisco HDLC frame format is Flag, Address, Control Proprietary, Data, FCS, Flag. The PPP frame format is Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag. The SDLC and LAPB format is Flag, Address, Control, Data, FCS, Flag.


27. You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use?

A. 0.0.15.255
B. 0.0.255.255
C. 0.0.31.255
D. 0.0.127.255
E. 0.0.255.0

>> !
Answer: A


28. When using access lists, what does a Cisco router check first?

A. To see if the packet is routable or bridgeable
B. The destination address
C. The source address
D. The packet contents

>> !
Answer: A

The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.


29. What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out.

A. Only traffic from the source network 172.16.0.0 will be blocked.
B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked.
C. Non-172.16.0.0 traffic will be forwarded.
D. All traffic will be forwarded.

>> !
Answer: B

Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. The wildcard mask 0.0.255.255 tells the router to check the first 2 octets and to ignore the last 2 octets.


30. How many access lists are allowed per interface?

A. Unlimited
B. Two per port, per protocol
C. One per port, per protocol
D. Router interface +1 per port

>> !
Answer: B

Only 2 access lists is allowed per interface. One inbound, one outbound. An access list must have conditions that test true for all packets that use the access list.


31. When using access lists, it is important where those access lists are placed. Which statement best describes access list placement?

A. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. Put standard access lists as near the destination as possible.
B. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible.
C. It isn't import where access lists are placed since the router will read and cache the whole list.
D. Put access lists as close to corporate headquarters as possible.

>> !
Answer: B

Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. Standard access lists don't specify the destination address.


32. Access lists are numbered. Which of the following ranges could be used for an IP access list? (Choose all that apply)

A. 600 - 699
B. 100 - 199
C. 1 - 99
D. 800 - 899
E. 1000 - 1099

>> !
Answer: B & C

AppleTalk access lists use numbers in the 600 - 699 range. IP uses 1 - 99 for standard access lists or 100-199 for extended access lists. IPX uses 800 - 899 or 900 - 999 for extended access lists. IPX SAP filters use 1000 - 1099. IP Standard = 1-99, IP Extended = 100-199, IPX Standard = 800-899, IPX Extended 900-999, IPX SAP filters = 1000-1099, and Apple Talk 600-699.


33. The previous system administrator created an access list with the following statements: access-list 101 deny TCP 172.16.4.0 0.0.0.255 any eq 21 access-list 101 permit IP any any What will happen when you try to PING an address on the 172.16.4.0 net?

A. PING won't work since it is filtered out.
B. PING will be successful.
C. Telnet won't be successful.
D. FTP won't be successful.

>> !
Answer: B

Echo (ping) is port number 7 and port number 21 is FTP. Port number 20 may also need to be added to negate any FTP traffic.


34. What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out

A. All traffic is blocked.
B. This will allow traffic from subnet 172.16.4.0 and block all other traffic.
C. All traffic is allowed.
D. This will block traffic from subnet 172.16.4.0 and allow all other traffic.

>> !
Answer: D

This will block traffic from subnet 172.16.4.0 and allow all other traffic. The first statement "access-list 1 deny 172.16.4.0 0.0.0.255" will deny access to the subnet 172.16.4.0.


35. Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do?

A. It tells the router to check the corresponding bit value.
B. It tells the router to ignore the corresponding bit value.
C. It tells the router to check its alternate routing list.
D. It tells the router to use its primary routing list.

>> !
Answer: A

It tells the router to check the corresponding bit value. 0=Check 1=Ignore


36. In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 255.255.255.255?

A. unlimited
B. all
C. any
D. ignore all

>> !
Answer: C

Cisco uses any to specify 255.255.255.255. This tells the router to ignore all and permit any address to use an access list test. Cisco uses host to specify 0.0.0.0. This tells the router to check all.


37. In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0?

A. any
B. host
C. all
D. include

>> !
Answer: B

Cisco uses host to specify 0.0.0.0. This tells the router to check all. Cisco uses any to specify 255.255.255.255. This tells the router to ignore all and permit any address to use an access list test.


38. Which Cisco FastHub repeaters are standalone and nonmanageable? (Choose all that apply)

A. 104T
B. 108T
C. 112F
D. 316T
E. 316C

>> !
Answer: A, B & C

The FastHub 100 Series are nonmanageable and standalone. The FastHub 300 Series are manageable and stackable.


39. Review the following configuration commands. interface ethernet 0 IP address 172.16.25.5 255.255.255.0 IP helper-address 172.16.10.10 What does the helper-address mean?

A. The helper-address points to another host on the network that will receive forwarded broadcasts from the router.
B. The helper-address points an exiting router.
C. The helper-address points to an existing server on the network.
D. The helper-address points to another bridge.

>> !
Answer: A

The Cisco IOS interface configuration command "ip helper-address 'address' " is used to provide a host address to receive forwarded UDP and BOOTP broadcasts. The helper address points to a TFTP server and all incoming TFTP requests at this interface are then forwarded to this address.


40. What do the following commands accomplish? access-list 1 deny 172.16.4.13 0.0.0.0 access-list 1 permit 0.0.0.0 255.255.255.255 interface ethernet 0 IP access-group 1 out.

A. Traffic from 172.16.4.13 is blocked and all other traffic is allowed.
B. Traffic from 172.16.4.13 is allowed and all other traffic is blocked.
C. All traffic is blocked.
D. All traffic is allowed.

>> !
Answer: A

Traffic from 172.16.4.13 is blocked and all other traffic is allowed. The 0s in all for octets tell the router to check the complete address and to any access. 0.0.0.0 in "access-list 1 permit 0.0.0.0 255.255.255.255" is a placeholder. 172.16.4.13 is denied by the first statement, all other traffic is permitted by the second statement.


41. What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255

A. This will block http traffic.
B. This will block ftp traffic.
C. This will permit ftp traffic.
D. This will permit tftp traffic.

>> !
Answer: B

This will block ftp traffic since ftp uses ports 20 and 21. This will deny all FTP traffic, but permit all other ip traffic. Both ports 20 and 21 are well known FTP ports.


42. You can access three forms of WAN services with Cisco routers. Select the three forms.

A. Switched or relayed services
B. Interface front end to IBM enterprise data center computers
C. Using protocols that connect peer-to-peer devices like HDLC or PPP encapsulation
D. IPX/SPX
E. NetBEUI

>> !
Answer: A, B & C

You can access three forms of WAN services with Cisco routers. Switched or relayed services include X.25, Frame Relay, and ISDN. An interface front end to IBM enterprise data center computers includes SDLC. And, you can access the services of WAN providers using protocols that connect peer devices such as HDLC and PPP encapsulation. IPX/SPX and NetBEUI are LAN protocols.


43. You are configuring security on a Cisco router. You type in: line console 0 login password Cisco You have just configured a password for which mode?

A. Non-privileged
B. Privileged
C. Executive
D. Administration

>> !
Answer: A

This Cisco IOS line configuration command "password 'password' " is used to specify a password for non-privileged access.


44. Select the command to set a password, san-fran, on the privileged mode.

A. san-fran password set
B. password san-fran
C. enable password san-fran
D. set password san-fran

>> !
Answer: C

To set the password on the privileged mode, enter enable-password san-fran. When you type enable at the Router> prompt, you will be prompted for a password. After successfully entering the password, you will get the Router# prompt for the privileged mode.