CCNA Sample Quetion Answers - 2

CCNA Sample Quetion Answers - 2

Identify 3 characteristics of an IP address?
* Contains a network portion and a host portion
* 32 bits long
* Unique to each network
* Part of the default Cisco configuration
* Referred to as the hardware address
Correct answer: A B C
An IP address is 32 bits long, it is referred as the logical or software address. It contains a network and host portion. Each IP address is unique.



What’s the default CDP holdtime in seconds for Cisco routers?
* 30 seconds
* 180 seconds
* 90 seconds
* 60 seconds
Correct answer: B
Cisco Discovery Protocol is a proprietary protocol to allow you to access configuration information on other routers and switches with a single command. It uses SNAP at the Data-Link Layer. By default CDP sends out a broadcast every 60 seconds and it holds this information for 180 seconds. CDP is enabled by default.

As system administrator, you type “debug ipx sap” and receive the following lines as part of the IOS response: type 0×4, “HELLO2″, 199.0002.0003.0006 (451), 2 hops type 0×4, “HELLO1″, 199.0002.0003.0008 (451), 2 hops What does “0×4″ signify?
* That is a Get Nearest Server response.
* That it is a General query.
* That it is a General response.
* That it is a Get Nearest Server request.
Correct answer: A

Identify 2 PPP characteristics?
* Is proprietary to Cisco
* Supports authentication
* Support compression
* Run on a multi-access network
Correct answer: B C
PPP supports authentication; PAP and CHAP. It also supports compression; Stacker and Predictor.

You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with hosts per subnet. What subnet mask will you use?
* 255.255.255.248
* 255.255.255.128
* 255.255.255.192
* 255.255.255.240
Correct answer: A
By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing 4 bits, you have (2×2x2×2)-2=14. By borrowing 5 bits, you have (2×2x2×2x2)-2=30. To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248.

Which processes does TCP, but not UDP, use?
* Windowing
* Acknowledgements
* Source Port
* Destination Port
Correct answer: A & B
UDP (User Datagram Protocol) does not use sequence or acknowledgement fields in transmission.
UDP is a connectionless and unreliable protocol, since there is no delivery checking mechanism in the UDP data format

Which addresses are INCORRECTLY paired with their class?
* 240 - 255, Class D
* 240 - 255, Class E
* 224 - 239, Class D
* 224 - 239, Class E
Correct answer: A & D
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and 240 to 255, Class E.

You are logged into a router, what command would show you the IP addresses of routers connected to you?
* show cdp neighbors detail
* show run
* show neighbors
* show cdp
Correct answer: A

What IP command would you use to test the entire IP stack?
* Stack-test
* Arp
* Telnet
* Ping
* Trace
Correct answer: C
Because Telnet is an application and it resides at the top of the stack it traverses down the stack and up the stack at the receiving end.

Which OSI layer handles physical address, network topology?
* Presentation
* Physical
* Transport
* Application
* Data-Link
* Network
Correct answer: E
Layer 2 the Data-Link layer performs this function.

Identify 3 characteristics regarding CDP?
* On by default
* Shows only directly connected neighbors
* Requires IP or IPX
* 60 second update interval by default
* 30 second updates interval by default
Correct answer: A B D
CDP stands for Cisco Discovery Protocol. It is used to discover directly connected neighbors, it is on by default and has a 60 second update interval by default.

Identify 3 feature of access-lists?
* Implicit deny will deny any packets not matched
* Processed sequentially from bottom to top
* Processed sequentially from top to bottom
* If a packet is denied it would be tested against the remaining statements in the access-list
* Once a match is made the packet is either denied or permitted
* Enabled on all interfaces by default
Correct answer: A C E
Access-list are processed from top to bottom, once a match occurs the packet is either denied or permitted and is no longer tested and if no match occurs the packet is denied via the implicit deny.

Share this

Related Posts

There was an error in this gadget