Google+ COMPUTER TRICKS, TWEAKS AND TUTORIALS: CCNA TEST PAPER EXAM

CCNA TEST PAPER EXAM



Q1  An organization wants to create a subnet of the IP network 172.16.0.0. This subnet will accommodate 1000 hosts. Which subnet mask should be assigned to this network?
1         255.255.0.0
2         255.255.248.0
3         255.255.252.0
4         255.255.254.0
5         255.255.255.0
6         255.255.255.128
Q2 What is the effect of using the Router# copy running-config startup-config command on a router?
1         The contents of ROM will change.
2         The contents of RAM will change.
3         The contents of NVRAM will change.
4         The contents of flash will change.
Q3 What is the result of using the clock rate 56000 command at the serial interface of the router?
1         The interface is configured as a DCE device.
2         The interface timers are cleared.
3         The FastEthernet interface is made to emulate a serial interface by assigning it a timing signal.
4         The IP address for the serial interface is configured
Q4 What are the characteristics of CSMA/CD? It monitors the media for presence of a data signal.
1         Devices can be configured with a higher transmission priority.
2         Data is transmitted only when the data signal is present.
3         It uses a token system to avoid collisions.
4         The device with the electronic token is the only one that can transmit after a collision.
Q5 In a Cisco IOS device, where is the startup-configuration file stored?
1         Flash
2         NVRAM
3         RAM
4         ROM
Q6.  What three protocols operate at the Application layer of the OSI model? (Choose three.)
1         ARP
2         DNS
3         PPP
4         SMTP
5         POP
6         ICMP
Q7 What is the Cisco name for the encapsulation type used on a serial interface?
1. HDLC
2. SDLC
3. SAP
4. SNAP
Q8  When using RIP, routing updates are broadcast every ____ seconds.
1         30 
2         10 
3         60
4         90 
Q9You are given the following address: 153.50.6.27/25. Determine the subnet mask,  address class, subnet address, and broadcast address. 
1         255.255.255.128, B,153.50.6.0, 153.50.6.127
2         255.255.255.128, C,153.50.6.0, 153.50.6.127
3         255.255.255.128, C,153.50.6.127, 153.50.6.0
4         255.255.255.224, C,153.50.6.0, 153.50.6.127
Q10  Which OSI layer incorporates the MAC address and the LLC?
1         Data link
2         Network
3         Physcial
4         Transport

Q11. Which of the following is a layer 2 device?
1         Switch
2          Router
3          Repeater
4          Hub
Q12. What is the purpose of the DLCI?
a.       Identifies the remote routers
b.      Contained with a 802.2 frame for routing purposes
c.       Used with PPP during authentication
d.      Identifies the PVC in a Frame Relay network
Q13. Identify 3 characteristics of switches?
1.       Increase available bandwidth
2.       Decrease broadcast traffic
3.       Support full duplex in a multipoint topology
4.       Make forwarding decision using MAC address
5.       Create collision domains

10. Which of these best describes the transition states of a port running STP?
1.      blocking > listening > learning > forwarding
2.       blocking > learning > listening > forwarding
3.       blocking > listening > holding > forwarding
4.       blocking > holding > listening > forwarding


11. VLSM is possible with ___?
1.      RIPv1
2.      RIPv2
3.      Both A and B
4.      Neither A nor B



12 .Which three statements about RSTP are true? (choose three)
1.      RSTP significantly reduces topology reconverging time after a link failure.
2.       RSTP expends the STP port roles by adding the alternate and backup roles.
3.       RSTP port atates are blocking,discarding,learing,or forwarding.
4.       RSTP also uses the STP proprsal-agreement sequence.
5.       RSTP use the same timer-baseed process as STP on point-to-point links.
6.       RSTP provides a faster transition to the forwarding state on point-to-point links than STP does.

13 Which command enables RSTP on a switch?
1.      spanningtree mode rapidpvst
2.       spanningtree uplinkfast
3.       spanningtree backbonefast
4.       spanningtree mode mst

14. Which two criteria does a switch use to select the root bridge? (Choose two.)
1. bridge priority
2. switching speed
3. number of ports
4. base MAC address
5. switch location
6. memory size

15. Examine the following options, which access list will permit HTTP traffic sourced from host 10.1.129.100 port 3030 destined to host 192.168.1.10
1. access-list 101 permit tcp 10.1.129.0 0.0.0.255 eq www 192.168.1.10 0.0.0.0 eq www
2. access-list 101 permit tcp 10.1.128.0 0.0.1.255 eq 3030 192.168.1.0 0.0.0.15 eq www
3. access-list 101 permit tcp host 192.168.1.10 eq 80 10.1.0.0 0.0.255.255 eq 3030
4. access-list 101 permit tcp any eq 3030
16  Bridges work at what layer of the OSI model?
1.      Data Link
2.       Network
3.      Physical
4.      Application
17. The Datalink layer works with which of the following:
1.      Packets
2.      Bits
3.      Globules
4.      Frames
5.      Segments
18. Identify the command to display the configured IP routing protocols?
1.      show protocols
2.      show protocols all
3.      show routing-protocols
4.      show ip protocols
19. Identify the statement which connects access-list 101 inbound to interface e0?
1.      Router(config-if)# ip access-group 101 in
2.      Router(config-if)# ip access-group 101
3.      Router(config)# ip access-group 101 e0 in
4.      Router(config)# ip access-group 101 e0 in


20. What is the command to manually enter a static route? 
1.      IP route <default gateway> <subnet mask> network 
2.      IP route <destination network> <default gateway> 
3.      IP route < destination network> <subnet mask> <default gateway> 
4.      IP route <destination network> <subnet mask> <source network> 

21. What should be the first command to create an access-list that prevents all users on
subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet
anywhere? 

1.      access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet 
2.      access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet 
3.      access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet 
4.      access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet 
5.      access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet  
6.      access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
22. Identify the access-list range for an extended IP access-list?
1.       800 - 899 
2.       1 - 99 
3.       1000 - 1099 
4.       100 - 199 

23. Which of the following are Distance Vector protocols? 
1.       IGRP 
2.       RIP 
3.       OSFP 
4.       EIGRP 
24 What is true about Link-State protocols?
1.       They maintain a more complex table than distant vector protocols 
2.       They maintain a less complex table than distant vector protocols 
3.       They use routing ports 
4.       The maintain backup copies of the IOS 

25. Put the following steps of encapsulation into the correct order: 
1) The data is broken into segments to be organized 
2) Frames are converted to 1s and 0s to be put on the wire 
3) Packets are converted into frames 
4) Information that users enter is converted into data 
5) The segments are changed to packets to be routed 

A.) 4, 1, 3, 2, 5 
B.) 4, 5, 1, 3, 2 
C.) 2, 3, 1, 4, 5 
D.) 4, 1, 5, 3, 2