CCENT (ICND1) Practice Certification Exam v5

match the description
_______________________________________________________________
Match the order
_______________________________________________________________
Match the packets
_______________________________________________________________
qx
_______________________________________________________________qx1
_______________________________________________________________
6
_______________________________________________________________
qx2
_______________________________________________________________
8
Which three statements accurately describe duplex and speed settings on Cisco 2960 switches? (Choose three.)
When the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode.
An autonegotiation failure can result in connectivity issues.
By default, the autonegotiation feature is disabled.
Enabling autonegotiation on a hub will prevent mismatched port speeds when connecting the hub to the switch.
The duplex and speed settings of each switch port can be manually configured.
By default, the speed is set to 100 Mb/s and the duplex mode is set to autonegotiation.
By default, autonegotiation is enabled on a Catalyst 2960 switch. However, the duplex and speed settings can be manually configured for each switch port. If the speed is set to 1000 Mb/s, the switch ports will operate in full-duplex mode. Switches, not hubs, can be configured for auto negotiation.
_______________________________________________________________
9
_______________________________________________________________
10
When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified?
when CEF is enabled
when the static route is a default route
when the next hop is a link-local address
when the exit interface is a point-to-point interface
Link-local addresses are only unique on a given link, and the same address could exist out multiple interfaces. For that reason, any time a static route specifies a link-local address as the next hop, it must also specify the exit interface. This is called a fully specified static route.
_______________________________________________________________
11
Refer to the exhibit. Which password will the administrator need to use on this device to enter privileged EXEC mode?
Cisco
class
password
cisco
_______________________________________________________________
qx3
_______________________________________________________________
13
_______________________________________________________________
14
14
Refer to the exhibit. OSPFv2 has been configured on router R1, and the router-id command has not been manually configured. When the network administrator reboots router R1, what will be the value of the OSPF router ID?
172.16.1.1
192.168.2.254
10.15.15.1
10.0.10.2
If the router ID is not exactly specified by the router-id command, then the highest IPv4 address on any configured loopback interface(s) would become the router ID.
_______________________________________________________________
15
_______________________________________________________________
16
_______________________________________________________________
17
_______________________________________________________________
18
A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router?
Configure the port as an access port and a member of VLAN1.
Configure the port as an 802.1q trunk port.
Configure the port as a trunk port and assign it to VLAN1.
Configure it as a trunk port and allow only untagged traffic.
The port on the switch that connects to the router interface should be configured as a trunk port. Once it becomes a trunk port, it does not belong to any particular VLAN and will forward traffic from various VLANs.
_______________________________________________________________
19
_______________________________________________________________
20
A network administrator is designing an IPv4 addressing scheme and requires these subnets.
1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hosts
Which combination of subnets and masks will provide the best addressing plan for these requirements
9 subnets of 126 hosts with a 255.255.255.128 mask
3 subnets of 126 hosts with a 255.255.255.128 mask
6 subnets of 30 hosts with a 255.255.255.224 mask

3 subnets of 126 hosts with a 255.255.255.192 mask
6 subnets of 30 hosts with a 255.255.255.240 mask
1 subnet of 126 hosts with a 255.255.255.192 mask
2 subnets of 80 hosts with a 255.255.255.224 mask
6 subnets of 30 hosts with a 255.255.255.240 mask
IPv4 subnets that require 100 and 80 hosts are provided by creating subnets of 126 usable addresses, each of which requires 7 host bits. The resulting mask is 255.255.255.128.
Subnets that require 30 and 20 hosts are provided by creating subnets of 30 usable addresses, each of which requires 5 host bits. The resulting mask is 255.255.255.224.
Creating nine subnets, each consisting of 126 usable addresses, would waste large numbers of addresses in the six smaller subnets.
_______________________________________________________________
21
_______________________________________________________________
22
22
Refer to the exhibit. A network administrator has configured R2 for PAT. Why is the configuration in?
The static NAT entry is missing.
NAT-POOL2 is bound to the wrong ACL.
The ACL does not define the list of addresses to be translated.
The overload keyword should not have been applied.
In the exhibit, NAT-POOL 2 is bound to ACL 100, but it should be bound to the configured ACL 1. This will cause PAT to fail. 100, but it should be bound to the configured ACL 1. This will cause PAT to fail.
_______________________________________________________________
23
_______________________________________________________________
24
24
Refer to the exhibit. Which two statements are based on the output as shown in the exhibit? (Choose two.)
The output is the result of the show ip nat translations command.
The host with the address 209.165.200.235 will respond to requests by using a source address of 192.168.10.10.
The host with the address 209.165.200.235 will respond to requests by using a source address of 209.165.200.235.
Traffic with the destination address of a public web server will be sourced from the IP of 192.168.1.10.
The output is the result of the show ip nat statistics command.
The output displayed in the exhibit is the result of the show ip nat translations command. Static NAT entries are always present in the NAT table, while dynamic entries will eventually time out.
_______________________________________________________________
25
_______________________________________________________________
26
26
Refer to the exhibit. Interfaces Fa0/5, Fa0/7, and Fa0/9 are the only connected ports on the switch CiscoSwitch. All other ports are unused. Which security best practice did the administrator forget to configure?​
Change the native VLAN to a fixed VLAN other than VLAN 1.​
All active user ports are associated with VLANs distinct from VLAN 1​.
Delete VLAN 1 from the switch CiscoSwitch.
Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on the network.​
All access ports are placed in VLAN 1 by default. This VLAN is the default VLAN and cannot be deleted or renamed. Security best practices dictate that user ports should be changed to something other than VLAN 1 with the command switchport access vlan ID.
_______________________________________________________________
27
27
Refer to the exhibit. Interfaces Fa0/2, Fa0/4, and Fa0/6 are connected to users on the data network of a switch named CiscoSwitch. Interface Fa0/24 is connected to a file server on the management network. All other ports are unused. Which security best practice did the administrator forget to configure?​​
Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on the network.​​
Change the native VLAN to a fixed VLAN other than VLAN 1.​
Disable autonegotiation on interfaces that are not being utilized as a trunk.
Delete VLAN 1 from CiscoSwitch.​
Cisco switches use DTP to autonegotiate between each other. It is recommended to disable autonegotiation to prevent any malicious users from forming a trunk with the Cisco switch on nontrunking interfaces.
_______________________________________________________________
28
_______________________________________________________________
29
A network engineer is configuring PAT on a router and has issued the command:
ip nat source list 1 interface serial 0/1/0 overload
Which additional command is required to specify addresses from the 192.168.128.0/18 network as the inside local addresses?
access-list 1 permit 192.168.128.0 255.255.192.0
access-list 1 permit 192.168.128.0 0.0.127.255
access-list 1 permit 192.168.128.0 0.0.63.255
ip nat inside source list 1 pool INSIDE_NAT_POOL
ip nat inside source static 192.168.128.0 209.165.200.254
A standard access list with the appropriate wildcard mask specifies the inside local addresses to be translated. The ip nat inside source list 1 pool NAT_POOL command configures NAT to use a pool of outside global addresses, not a single outside interface address as required. The ip nat inside source static 192.168.128.0 209.165.200.254 command configures one-to-one static NAT, not PAT as the overload keyword specifies.
_______________________________________________________________
30
_______________________________________________________________
31
_______________________________________________________________
32
_______________________________________________________________
33
_______________________________________________________________
34
_______________________________________________________________
35
_______________________________________________________________
36
Which three statements describe a DHCP Discover message? (Choose three.)
The source MAC address is 48 ones (FF-FF-FF-FF-FF-FF).
The destination IP address is 255.255.255.255.
The message comes from a server offering an IP address.
The message comes from a client seeking an IP address.
All hosts receive the message, but only a DHCP server replies.
Only the DHCP server receives the message.
_______________________________________________________________
37
Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.)
native VLAN mismatch
damaged cable connector
a malfunctioning NIC
excessive collisions
using the in cable type
inly configured auto-MDIX feature
In an Ethernet network, a runt is a frame that is shorter than 64 bytes and a giant is a frame that is longer than the maximum allowed length. Both are often caused by NIC malfunctioning, but can also be caused by excessive collisions. CRC errors usually indicate a media or cable error caused by electrical interference, loose or damaged connections, or using the in cabling type.
_______________________________________________________________
38
_______________________________________________________________
39
_______________________________________________________________
40
Fill in the blank.
A late collision occurs after 512 bits of a frame have been transmitted.
_______________________________________________________________
41
_______________________________________________________________
42
_______________________________________________________________
43
_______________________________________________________________
44
_______________________________________________________________
45
_______________________________________________________________
46
Which series of commands will cause access list 15 to restrict Telnet access on a router?
R1(config)# line vty 0 4
R1(config​-line)# access-class 15

R1(config)# line vty 0 4
R1(config​-line)# ip access-group 15 in
R1(config)# int gi0/0
R1(config​-if)# access-class 15 in
R1(config)# int gi0/0
R1(config​-if)# ip access-group 15 in
Once an access list to restrict Telnet or SSH access has been created, it is applied to the vty lines with the access-class command. This will restrict Telnet or SSH access.
_______________________________________________________________
47
_______________________________________________________________
48
_______________________________________________________________
49
A user calls the help desk to report that a Windows XP workstation is unable to connect to the network after startup and that a popup window says “This connection has limited or no connectivity.” The technician asks the user to issue the ipconfig /all command. The user reports the IP address is 169.254.69.196 with subnet mask of 255.255.0.0 and nothing is displayed for the DNS server IP address. What is the cause of the problem?
The workstation NIC has malfunctioned.
The subnet mask was configured inly.
The DNS server IP address needs to be configured.
The workstation is unable to obtain an IP address from a DHCP server.
_______________________________________________________________
50
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which code is displayed on the web browser?
Great!
It works!
Welldone!
Inter-VLAN configured!
_______________________________________________________________
51
_______________________________________________________________
qx11
_______________________________________________________________
53
_______________________________________________________________
16x
_______________________________________________________________
55

WATCH RIHANNA'S S3X VIDEO BY CLICKING DOWN HERE..

Facebook Blogger Plugin by Jay Brown

Post a Comment

  1. this practice exam, is it possible to be the real CCENT exam means ICND1 exam? thnks

    ReplyDelete
  2. Routing and Switching Essentials (Version 5.0) - RSE CCENT (ICND1) Certification Exam. Who has the real exam info? ?

    ReplyDelete

 
Top