You are on page 1of 21

CCENT Practice Certification Exam # 2

1 Data is being sent from a source PC to a destination server. Which


three statements correctly describe the function of TCP or UDP in this
situation? (Choose three.)

1. The UDP destination port number identifies the application or service


on the server which will handle the data.
2. TCP is the preferred protocol when a function requires lower network
overhead.
3. UDP segments are encapsulated within IP packets for transport across
the network.
4. The source port field identifies the running application or service that
will handle data returning to the PC.
5. The TCP source port number identifies the sending host on the
network.
6. The TCP process running on the PC randomly selects the destination
port when establishing a session with the server.

Observable Description Max Value


1 correctness of response 1 point for Option 1, Option 3, Option 4
CCNA Exploration: Network Fundamentals 4.1.5 Port Addressing

2 In what two situations would UDP be the preferred transport


protocol over TCP? (Choose two.)

when applications need to guarantee that a packet arrives intact, in sequence,


and unduplicated
when a faster delivery mechanism is needed
when delivery overhead is not an issue
when applications do not need to guarantee delivery of the data
when destination port numbers are dynamic

Observable Description Max Value


1 correctness of response 1 point for Option 2, Option 4
CCNA Exploration: Network Fundamentals 4.4.1 UDP - Low Overhead vs.
Reliability

3 Refer to the exhibit. Workstation A sends an IP packet to


workstation B. Which two statements describe the encapsulation of
the packet as it passes through the network?
The Layer 2 header is stripped from the packet by each router.
The destination Layer 2 address of the packet does not change.
The source Layer 3 address of the packet changes at each router.
The Layer 2 header changes at each router.
The Layer 3 header is stripped from the packet by each router.
Observable Description Max Value
1 correctness of response 1 point for Option 1, Option 4
CCNA Exploration: Network Fundamentals 7.4.1 Follow Data Through an
Internetwork

4 Refer to the exhibit. A switch with a default configuration connects


four hosts. The ARP table for host A is shown. What happens when
host A wants to send an IP packet to host D?

Host A sends an ARP request to the MAC address of host D.


Host D sends an ARP request to host A.
Host A sends out the packet to the switch. The switch sends the packet only to
the host D, which in turn responds.
Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to
the switch receives the broadcast and host D responds with its MAC address.

Observable Description Max Value


1 correctness of response 1 point for Option 4
CCNA Exploration: Network Fundamentals 9.7.1 The ARP Process - Mapping IP
to MAC Addresses

5 What three services are provided by the transport layer? (Choose


three.)

flow control
encryption of data
path determination
connection establishment
error recovery
bit transmission
data representation

Observable Description Max Value


1 correctness of response 1 point for Option 1, Option 4, Option 5
CCNA Exploration: Network Fundamentals 4.1.2 Controlling the Conversations

6 Which layer of the OSI model handles the process of identifying and
discarding damaged frames?
presentation
session
transport
network
data link
physical
Observable Description Max Value
1 correctness of response 1 point for Option 5
CCNA Exploration: Network Fundamentals 7.3.4 Framing - Role of the Trailer

7 Refer to the exhibit. Considering the information that follows and


the exhibit, where is the data flowing?

Source IP address: 192.168.1.88


Destination IP address: 209.165.200.225
Source MAC address: 00-11-12-7a-41-10
Destination MAC address: 00-0d-cc-f4-ad-2c
Source Port: 1464
Destination Port: 23

A – from laptop to access point


B – from access point to attached switch
C – from host to default gateway router
D – from router to ISP

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 7.4.1 Follow Data Through an
Internetwork

8 Refer to the exhibit. If Host 1 needs to request its IP address from


the server, what protocol would be used to process that request?
CSMA/CD
CSMA/CA
DHCP
ICMP
NAT
FTP

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 6.3.2 Static or Dynamic Addressing
for End User Devices

9 Refer to the exhibit. If Host 1 were to transfer a file to the server,


what layers of the TCP/IP model would be used?

only application and Internet layers


only Internet and network access layers
only application, Internet, and network access layers
application, transport, Internet, and network access layers
only application, transport, network, data link, and physical layers
application, session, transport, network, data link, and physical layers

Observable Description Max Value


1 correctness of response 1 point for Option 4
CCNA Exploration: Network Fundamentals 7.3.5 Data Link Layer Protocols - The
Frame

10 ABC company needs to connect its router to an ISP to access the


Internet. What device is needed to connect the router to the ISP if the
ISP supplies a T1 leased line for the connection?
CSU/DSU
modem
DSL router
NT1 device
ISDN modem
Observable Description Max Value
1 correctness of response 1 point for Option 1
CCNA Exploration: Network Fundamentals 10.2.3 Making WAN Connections

11 Refer to the exhibit. How many collision domains exist in the exhibited

network?
1
2
3
6
7

Observable Description Max Value


1 correctness of response 1 point for Option 1
CCNA Exploration: Network Fundamentals 9.4.2 CSMA/CD - The Process

12 What are two actions performed by a Cisco switch? (Choose two.)

building a routing table that is based on the first IP address in the frame header
using the source MAC addresses of frames to build and maintain a MAC address
table
forwarding frames with unknown destination IP addresses to the default
gateway
utilizing the MAC address table to forward frames via the destination MAC
address
examining the destination MAC address to add new entries to the MAC address
table

Observable Description Max Value


1 correctness of response 1 point for Option 2, Option 4
2.1.1 Key Elements of Ethernet/802.3 Networks

13 A network administrator wants to configure a Cisco 2960 switch so


that access to each switch port is limited to one MAC address. What
will accomplish the administrator’s objective?

Cisco Discovery Protocol


port security
Internet Control Message Protocol
access lists
flow control

Observable Description Max Value


1 correctness of response 1 point for Option 2
CCNA Exploration: LAN Switching and Wireless 2.4.6 Configuring Port Security

14 When would you want to use the switchport port-security mac-


address sticky command?

whenever you need to protect an unused switch port


whenever you want the port to only allow a single host device to connect
whenever you need the port to recognize the statically assigned MAC address
in the MAC address table
whenever multiple devices share the same port

Observable Description Max Value


1 correctness of response 1 point for Option 4
CCNA Exploration: LAN Switching and Wireless 2.4.6 Configuring Port Security

15 Refer to the exhibit. Switch1 has only the following commands


added to a default Cisco 2960
configuration:

enable secret cisco


line vty 0 4
password Kn0ckkn-cK
login
interface vlan 1
ip address 10.0.1.8 255.255.255.0
no shutdown
Assume that routing between networks is functioning properly and
that Switch2 has been properly configured for remote access. What
would the result be if the telnet 10.0.2.2 command is issued from
Switch1 privileged mode?

The following prompt would appear:


User Access Verification
Password:
Switch2 would return a destination unreachable message to Switch1.
Router1 would return a destination unreachable message to Switch1.
The packet would be dropped.

Observable Description Max Value


1 correctness of response 1 point for Option 4
CCNA Exploration: Network Fundamentals 11.2.4 Configuring Interfaces

16 When configuring a switch to use SSH for virtual terminal


connections, what is the purpose of the crypto key generate rsa
command?
show SSH connected hosts
disconnect SSH connected hosts
create a public and private key pair
show active SSH ports on the switch
access the SSH database configuration

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: LAN Switching and Wireless 2.4.3 Configure Telnet and SSH

17 Which three statements are true about full-duplex operation on an


Ethernet network? (Choose three.)
There are no collisions in full-duplex mode.
A dedicated switch port is required for each node.
Hub ports are preconfigured for full-duplex mode.
The host network card must detect the availability of the media before
transmitting.
The host network card and the switch port must both be in full-duplex mode.

Observable Description Max Value


1 correctness of response 1 point for Option 1, Option 2, Option 5
CCNA Exploration: Network Fundamentals 9.6.2 Ethernet - Using Switches

18 What are three characteristics of CSMA/CD? (Choose three.)

Devices can be configured with a higher transmission priority.


A jam signal indicates that the collision has cleared and the media is not busy.
A device listens and waits until the media is not busy before transmitting.
The device with the electronic token is the only one that can transmit after a
collision.
All of the devices on a segment see data that passes on the network medium.
After detecting a collision, hosts can attempt to resume transmission after a
random time delay has expired.

Observable Description Max Value


1 correctness of response 1 point for Option 3, Option 5, Option 6
CCNA Exploration: Network Fundamentals 9.4.2 CSMA/CD - The Process

19

Observable Description Max Value


1 correctness of response See feedback. 1
CCNA Exploration: LAN Switching and Wireless 2.3.6 Basic Switch
Configuration

20 Which three addresses are valid public addresses? (Choose three.)

198.133.219.17
192.168.1.245
10.15.250.5
128.107.12.117
192.15.301.240
64.104.78.227

Observable Description Max Value


1 correctness of response 1 point for Option 1, Option 4, Option 6
CCNA Exploration: Network Fundamentals 6.2.5 Public and Private Addresses

21 Refer to the exhibit. Four hosts are being added to the


172.16.112.0 network. Which IP address is invalid as a host address
for this network?
172.16.113.55
172.16.112.255
172.16.127.255
172.16.112.89
172.16.120.96

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 6.2.2 Calculating Network, Hosts
and Broadcast Addresses

22 Refer to the exhibit. Using PAT, RouterA is configured to translate


all private inside addresses to a single public address. The network
administrator wants to determine which port number is being used in
the translation of the ComputerA inside private IP address. Which

command could be used if the administrator sits at ComputerA but is


not allowed remote access to RouterA?
ipconfig /all
traceroute
netstat
tracert

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 4.5.1 Observing TCP and UDP using
Netstat
CCNA Exploration: Accessing the WAN 7.2.8 Verifying and Troubleshooting NAT
Configurations

23 What type of address is 172.16.134.64 with the subnet mask


255.255.255.224?
This is a usable host address.
This is a broadcast address.
This is a network address.
This is an Internet-routable address.

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 6.2.2 Calculating Network, Hosts and
Broadcast Addresses

24 The router reads each bit to determine the class of an address.


Which three series of binary numbers would the router identify as
public Class C addresses? (Choose three.)

10101100.00100000.00010001.00010111
11000110.10000101.11011011.01010111
11010001.10100101.11001000.11101101
11000000.10101000.00100000.01000000
11000000.00011111.00000111.10111011

Observable Description Max Value


1 correctness of response 1 point for Option 2, Option 3, Option 5
CCNA Exploration: Network Fundamentals 6.2.5 Public and Private Addresses

25 Given a host with the IP address 192.168.65.54 and a subnet


mask of 255.255.255.240, to which network does the host belong?

192.168.65.16
192.168.65.32
192.168.65.48
192.168.65.64

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 6.5.1 Basic subnetting
26 Refer to the exhibit. Which IP address can be assigned to the

default gateway for host A?


10.184.0.1
10.192.0.0
10.199.255.254
10.200.255.254

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 6.2.2 Calculating Network, Hosts
and Broadcast Addresses

27 Refer to the exhibit. What would be a valid network address for

the new subnet on RTA?

10.16.10.16/28
10.16.10.24/28
10.16.10.30/28
10.16.10.56/28
10.16.10.72/28

Observable Description Max Value


1 correctness of response 1 point for Option 1
CCNA Exploration: Network Fundamentals 6.2.2 Calculating Network, Hosts and
Broadcast Addresses
28 Refer to the exhibit. The network shown is using classful
subnetting. The serial link between routers A and B is configured with
addresses from the 172.16.6.0/23 subnet. How many valid IP
addresses are wasted on this subnetwork?
252
254
256
508
510
512

Observable Description Max Value


1 correctness of response 1 point for Option 4
CCNA Exploration: Network Fundamentals 6.5.3 Subnetting - Subnetting a
Subnet

29 What are three valid host addresses given a subnet mask of


255.255.254.0? (Choose three.)

64.100.2.255
172.55.33.255
64.104.129.0
192.168.162.255
10.165.55.255
128.107.62.0

Observable Description Max Value


1 correctness of response 1 point for Option 1, Option 3, Option 4
CCNA Exploration: Network Fundamentals 6.2.2 Calculating Network, Hosts
and Broadcast Addresses

30 Refer to the exhibit. Which two interfaces could be used for a


leased-line WAN connection? (Choose two.)

A
B
C
D
E
F
Observable Description Max Value
1 correctness of response 1 point for Option 1, Option 2
CCNA Exploration: Network Fundamentals 10.2 Device Interconnections
31 What type of cable is used for connectivity between a model 2620
router and a model 2950 switch (point A), a model 2950 switch and a
model 1900 switch (point B), and a model 2950 switch and a host
(point C)?

A – straight-through; B – rollover; C – straight-through


A – crossover; B – straight-through; C – straight-through
A – straight-through; B – straight-through; C – crossover
A – crossover; B – straight-through; C – crossover
A – straight-through; B – crossover; C – straight-through
A – straight-through; B – crossover; C – crossover

Observable Description Max Value


1 correctness of response 1 point for Option 5
CCNA Exploration: Network Fundamentals 10.2.2 Making LAN Connections

32 Refer to the exhibit. A small business has asked for advice about
what type of cable will be needed to connect their modular routers.
What type of connector is used by each device that is shown?

WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-


1ENET is an RJ45 connector.
WIC-2T is an RJ45 connector, WIC1T is a DB60 connector, and WIC-1ENET is a
Smart Serial connector.
WIC-2T is a DB60 connector, WIC1T is a Smart Serial connector, and WIC-
1ENET is an RJ45 connector.
WIC-2T is a Token Ring connector, WIC1T is a DB25 connector, and WIC-1ENET
is an RJ11 connector.
WIC-2T is a Smart Serial connector, WIC1T is a DB60 connector, and WIC-
1ENET is an RJ45 connector.
Observable Description Max Value
1 correctness of response 1 point for Option 5
CCNA Exploration: Network Fundamentals 10.2.3 Making WAN Connections
33 Refer to the exhibit. The router that is named myhome has
received a frame from the host 192.168.254.7. The contents of this
frame are being sent to host 172.16.14.243. What is the Layer 2

destination address of the frame as it leaves the myhome router?

0008.a3b6.ce05
0009.1281.18a8
000a.8a47.e612
172.16.14.129
172.16.14.243
192.168.254.7

Observable Description Max Value


1 correctness of response 1 point for Option 1
CCNA Exploration: Network Fundamentals 11.1.6 IOS Examination Commands

34 Why is it important for the router to maintain an accurate routing


table?

to provide Layer 2 addressing information for the next hop


to prevent broadcasts from occurring on the LAN
to determine the best path to the destination network
to identify all of the routers in a network

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Routing Protocols and Concepts 1.4.2 Best Path and Metric
35 Refer to the exhibit. Based on the exhibited router output, what
two conclusions can be made? (Choose two.)

The enable password has been encrypted.


The service password-encryption command has not been added to the
configuration.
The passwords that are shown restrict access to the router console.
The password that will gain access to privileged mode is sys#op.
The passwords that are shown will be required to enter privileged EXEC mode
on this router.
Observable Description Max Value
1 correctness of response 1 point for Option 2, Option 5
CCNA Exploration: Network Fundamentals 11.2.2 Limiting Device Access -
Configuring Passwords and Using Banners

36 What would be a common reason to upgrade from RIPv1 to RIPv2?

RIPv2 takes less router memory than RIPv1 takes.


RIPv2 supports a larger network (more routers) than RIPv1 supports.
RIPv2 supports discontiguous networks and RIPv1 does not.
RIPv2 supports classless routing. RIPv1 is classful.

Observable Description Max Value


1 correctness of response 1 point for Option 4
CCNA Exploration: Routing Protocols and Concepts 7.2.1 Enabling and
Verifying RIPv2
37 Refer to the exhibit. Which two statements are true of the output

shown? (Choose two.)

The protocol that communicated this information operates at Layer 3 of the OSI
model.
The output of this command displays information about directly connected
Cisco devices only.
The switch is attached to the SanJose1 FastEthernet0/21 interface.
SanJose1 is running CDP version 12.0.
SanJose1 has two fully operational, CDP-enabled Cisco switches directly
connected to it.
SanJose2 is a 2600 series router running several routed protocols.

Observable Description Max Value


1 correctness of response 1 point for Option 2, Option 6
CCNA Exploration: Routing Protocols and Concepts 2.3.3 Cisco Discovery
Protocol (CDP)

38 Which two statements describe the command ip route


192.168.7.24 255.255.255.248 192.168.7.9? (Choose two.)

A packet that is destined for host 192.168.7.30 will be forwarded to address


192.168.7.9.
The address 192.168.7.9 is the destination network for this route.
The address 192.168.7.24 is the next-hop router in this command.
This command is issued from the interface configuration mode.
This command is used to define a static route.

Observable Description Max Value


1 correctness of response 1 point for Option 1, Option 5
CCNA Exploration: Routing Protocols and Concepts 2.4.2 Configuring Static
Routes

39 Which group of commands allows a router to be administered


remotely?

line con 0
password class
login

interface fa0/1
ip address 192.168.10.1 255.255.255.0
access-class 1 in

line vty 0 4
password cisco
login

interface vlan 1
ip address 192.168.10.1 255.255.255.0
no shutdown

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 11.2.1 Devices Need Names

40 Which protocol is described as an enhanced distance vector


routing protocol?

RIP v1
RIP v2
EIGRP
OSPF

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Routing Protocols and Concepts 9.1.1 EIGRP: An Enhanced
Distance Vector Routing Protocol

41 Why is the ip host command used to create host tables on Cisco


routers?

to create static routes to specific hosts


to allow communication with other IP devices by name
to provide a meaningful name for the local router
to identify only the directly attached networks and associated hosts
to define the host devices with which the router is allowed to connect

Observable Description Max Value


1 correctness of response 1 point for Option 2
CCNA Exploration: Routing Protocols and Concepts 1.2.2 Basic Router
Configuration

42 Refer to the exhibit. From router R1, the command telnet


192.168.11.2 is entered from privileged mode and this message
displays:

00:06:45: %SYS-5-CONFIG_I: Configured from console by console 192.168.11.2


Trying 192.168.11.2 . . . Open

Password required, but none set

If the R2 interfaces are in the status shown in the exhibit, what is the most
likely problem?
The enable secret command is missing from R2.
The enable password command is missing from R1.
The login command is missing from the line configuration mode on R2.
The password command is missing from the line configuration mode on R2.
The login command is missing from the console mode on R2.
The no shutdown command is missing from the Serial 0/0 interface mode on
R1.

Observable Description Max Value


1 correctness of response 1 point for Option 4
CCNA Exploration: Network Fundamentals 11.2.2 Limiting Device Access -
Configuring Passwords and Using Banners

43 Which two items can be modified by the system administrator to


determine from where the Cisco IOS loads? (Choose two.)

system ROM
startup configuration file
system image file
configuration register value
bootloader image file
Observable Description Max Value
1 correctness of response 1 point for Option 2, Option 4
CCNA Exploration: Routing Protocols and Concepts 1.1.4 Router Boot-up
Process

44 What are two requirements for establishing a console


communication session between a computer and a router? (Choose
two.)

A console cable must be used from the console port of the router to the NIC of
the computer.
A rollover cable must be used from the console port of the router to the serial
port of the computer.
A default gateway must be configured on the computer.
The IP addresses assigned to the router and computer must be on the same
subnetwork.
There must be a terminal emulator application on the computer.

Observable Description Max Value


1 correctness of response 1 point for Option 2, Option 5
CCNA Exploration: Network Fundamentals 10.5.2 Making the Device
Management Connection

45

Observable Description Max Value


1 correctness of response See feedback. 1
46 What is the outcome when a wireless host has a different SSID
configured than the access point to which it is attempting to connect?

The access point will send the host a rejection message.


The host will be prompted for a userid and password.
The access point will send the host a challenge message.
The host will only be allowed access to the Internet.
The access point will send the host a re-authentication request message.
The host will not be allowed access to the wireless network.

Observable Description Max Value


1 correctness of response 1 point for Option 6
CCNA Exploration: LAN Switching and Wireless 7.1.4 Wireless Operation

47 A wireless network has one access point installed. Users at some


locations in the office complain that their wireless access is slow,
while others say that the wireless network performance is fine. What
should be done to remedy this situation?

Replace the access point.


Install another access point at another location within the office.
Upgrade the wireless NICs in the hosts that are slow.
Limit the number of wireless hosts that attach to the access point at one time.
Convert back to a wired network.

Observable Description Max Value


1 correctness of response 1 point for Option 2
CCNA Exploration: LAN Switching and Wireless 7.1.5 Planning the Wireless LAN

48 Which technology is primarily used for security in a wireless


network environment?

SSH
WPA
SSID
CSMA/CA
CSMA/CD

Observable Description Max Value


1 correctness of response 1 point for Option 2
CCNA Exploration: LAN Switching and Wireless 7.2.2 Wireless Security
Protocols

49
Observable Description Max Value
1 correctness of response See feedback. 1

50 Which technology is primarily used in a WAN?

ARP
CDP
PPP
WEP
CSMA/CD

Observable Description Max Value


1 correctness of response 1 point for Option 3
CCNA Exploration: Network Fundamentals 7.3.5 Data Link Layer Protocols - The
Frame