Certified Network Associate1. You need to copy the current system image file from the router to the network server, so you type "copy flash tftp" from the privileged EXEC mode. As the file is copying you need to cancel the copy, what series of keys will allow you to do this? A. Ctrl + ^+6 B. Ctrl + s C. Ctrl + h D. Alt + ^
2. You are copying a new system image file to your router from a tftp server because the present file has become corrupted. While the file is copying, you see a series of exclamation points. What do these mean? A. Each exclamation point (!) means that one UDP segment has successfully transferred. B. Each exclamation point (!) means that one TCP segment has successfully transferred. C. Each exclamation point (!) means that there has been a successful check run verification on a segment. D. The exclamation point is for informational purposes only and has no real significance.
3. How do you cause a router to enter setup mode? (Choose all that apply) A. Type "setup" at the Router# prompt. B. If the router is new or if NVRAM is corrupted, the router will automatically enter setup mode. C. The router is always in setup mode. D. You can't force the router to enter setup mode.
4. Cisco Discovery Protocol (CDP) can discover any directly connected routers. On which OSI model layer does it work? A. Datalink B. Physical C. Network D. Session E. Presentation
5. The physical media that support ______ can connect CDP devices. A. SNAP B. TCP/IP C. Novell IPX D. AppleTalk
6. You are an administrator connected to Router 1, which in turn is directly connected to Router 2 and Router 3. Router 4 is directly connected to Router 3. You need to obtain information from Router 4. How would you go about it? A. telnet to Router 4 B. use CDP C. type running-config D. telnet to Router 3
7. You need to disable CDP on your router. How would you do this? A. Type "no cdp run" at the Router(config)# prompt B. Type "no cdp run" at the Router(config-if)# prompt C. Type "no cdp enable" at the Router(config)# prompt D. Type "no cdp run" at the Router(config)# prompt Type "no cdp enable" at the Router(config-if)# prompt to disable CDP on an interface. By default, CDP is automatically enabled on a router and its interfaces
8. You need to disable CDP on a specific router interface. How would you do this? A. Type "no cdp run" at the Router(config)# prompt B. Type "no cdp run" at the Router(config-if)# prompt C. Type "no cdp enable" at the Router(config-if)# prompt D. Type "no cdp enable" at the Router(config)# prompt
9. CDP, by default, is set to discard CDP packets from other routers after 180 seconds. You have a network that has frequent changes to the router configuration files. What should you do to have the receiving routers purge information quicker? A. Configure the CDP holdtime to be less than the CDP timer does. B. Configure the CDP holdtime to be more that the CDP timer. C. Configure the CDP holdtime to equal the CDP timer. D. Type no CDP holdtime.
10. You have decreased the CDP time to 30 seconds, what impact will this have on your network? (Choose all that apply) A. Router updates are quicker. B. Bandwidth usage will increase. C. Bandwidth usage will decrease. D. Router updates are slower.
11. What is the correct prompt and command to configure the CDP timer? A. cdp timer [seconds] at the Router# prompt. B. cdp timer [seconds] at the Router(config)# prompt. C. cdp holdtime [seconds] at the Router# prompt. D. cdp timer [seconds] at the Router(config-if)# prompt.
12. How do you find out information about other CDP devices that are connected to you? A. Type "show cdp neighbors" at the Router# prompt. B. Type "show cdp devices" at the Router# prompt. C. Type "show cdp" at the Router# prompt. D. Type "show cdp neighbors" at the Router(config)# prompt.
13. You have entered the command "show cdp entry routerB" at the Router# prompt. No information is returned, what could cause this? A. The router's name is RouterB. B. You should have entered "cdp entry routerB.cisco.com" C. You should have entered "cdp routerB.cisco.com" D. You should have entered "cdp routerB"
14. The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }
15. How would you configure one host name that points to two IP addresses? A. IP host P1R1 1.0.0.5 2.0.0.8 B. IP P1R1 1.0.0.5 2.0.0.8 C. IP host P1R1 1.0.0.5 D. IP host duplicate "all"
16. As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command? A. 6 B. 1 C. 2 D. 4
17. You have typed "ping" 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the "." signify? A. That one message was successful. B. That all messages were successful. C. That one message timed out. D. That one message completed in under the allotted timeframe.
18. You are logged into the Jackson router, what command would show you the IP addresses of routers connected to you? A. show cdp B. show run C. show neighbors D. show cdp neighbors detail
19. Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from ______. A. RIP B. IGRP C. IP D. TCP
20. The command "show IP protocol" displays which information? (Choose all that apply) A. routing timers B. network information C. contents of the IP routing table D. information about all known network and subnetworks
21. IGRP uses flash updates, poison reverse updates, holddown times, and split horizon. How often does it broadcast its routing table updates? A. 10 seconds B. 90 seconds C. 30 seconds D. 45 seconds
22. What is the Cisco name for the encapsulation type used on a serial interface? A. HDLC B. SDLC C. SAP D. SNAP
23. What is the method used by Cisco routers to identify packets for encryption? A. Category lists B. Access lists C. Filtered lists D. Cisco normal event listing
24. What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet
25. What is the function of DDR on Cisco routers? A. DDR is dial--on-demand routing. It provides a continuous LAN only connection. B. DDR is dial-on-demand routing. It provides routing for high volume traffic. C. DDR is dial--on-demand routing. It provides a continuous WAN connection. D. DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.
26. Select the fields for the Cisco HDLC protocol. A. Flag, Address, Control B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag C. Flag, Address, Control, Data, FCS, Flag D. Flag, Address, Control, Proprietary, Data, FCS, Flag
27. You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.0
28. When using access lists, what does a Cisco router check first? A. To see if the packet is routable or bridgeable B. The destination address C. The source address D. The packet contents
29. What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out. A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.
30. How many access lists are allowed per interface? A. Unlimited B. Two per port, per protocol C. One per port, per protocol D. Router interface +1 per port
31. When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. Put standard access lists as near the destination as possible. B. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
32. Access lists are numbered. Which of the following ranges could be used for an IP access list? (Choose all that apply) A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099
33. The previous system administrator created an access list with the following statements: access-list 101 deny TCP 172.16.4.0 0.0.0.255 any eq 21 access-list 101 permit IP any any What will happen when you try to PING an address on the 172.16.4.0 net? A. PING won't work since it is filtered out. B. PING will be successful. C. Telnet won't be successful. D. FTP won't be successful.
34. What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. All traffic is blocked. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. This will block traffic from subnet 172.16.4.0 and allow all other traffic.
35. Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.
36. In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 255.255.255.255? A. unlimited B. all C. any D. ignore all
37. In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0? A. any B. host C. all D. include
38. Which Cisco FastHub repeaters are standalone and nonmanageable? (Choose all that apply) A. 104T B. 108T C. 112F D. 316T E. 316C
39. Review the following configuration commands. interface ethernet 0 IP address 172.16.25.5 255.255.255.0 IP helper-address 172.16.10.10 What does the helper-address mean? A. The helper-address points to another host on the network that will receive forwarded broadcasts from the router. B. The helper-address points an exiting router. C. The helper-address points to an existing server on the network. D. The helper-address points to another bridge.
40. What do the following commands accomplish? access-list 1 deny 172.16.4.13 0.0.0.0 access-list 1 permit 0.0.0.0 255.255.255.255 interface ethernet 0 IP access-group 1 out. A. Traffic from 172.16.4.13 is blocked and all other traffic is allowed. B. Traffic from 172.16.4.13 is allowed and all other traffic is blocked. C. All traffic is blocked. D. All traffic is allowed.
41. What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block http traffic. B. This will block ftp traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.
42. You can access three forms of WAN services with Cisco routers. Select the three forms. A. Switched or relayed services B. Interface front end to IBM enterprise data center computers C. Using protocols that connect peer-to-peer devices like HDLC or PPP encapsulation D. IPX/SPX E. NetBEUI
43. You are configuring security on a Cisco router. You type in: line console 0 login password Cisco You have just configured a password for which mode? A. Non-privileged B. Privileged C. Executive D. Administration
44. Select the command to set a password, san-fran, on the privileged mode. A. san-fran password set B. password san-fran C. enable password san-fran D. set password san-fran
|