CCNA 1 Final Exam Answers 2011

1. Due to a security violation, the router passwords must be changed. What information can be learned from the following configuration entries? (Choose two.)
Router(config)# line vty 0 3
Router(config-line)# password c13c0
Router(config-line)# login

The entries specify three Telnet lines for remote access.

The entries specify four Telnet lines for remote access.

The entries set the console and Telnet password to "c13c0".

Telnet access will be denied because the Telnet configuration is incomplete.

Access will be permitted for Telnet using "c13c0" as the password.

 

2. Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.)

The packet will be discarded.

The packet will be sent back to the source.

The packet will be flooded out all interfaces.

Neighboring routers are polled to find the best path.

The packet will be forwarded to a default route if one is present.

 

3.

CCNA1 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?

The Telnet server process is running on PC1.

Only the exchange of the Telnet username and password is encrypted.

The GET request is sent to RouterA to retrieve data.

The SSH service is used to connect PC1 to RouterB.

 

4.

CCNA1Final thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)

The prefix of the subnet mask is /26.

The network on which this computer resides can have 30 hosts.

The computer is unable to communicate outside of the local network.

The address that is assigned to the computer represents private addressing.

The IP address that is assigned to the computer is routable on the Internet.

The IP address that is assigned as the default gateway is valid for this host.

 

5. What information can be gathered by using the command netstat?

the default gateway

the routing protocol

active TCP connections

the locally configured subnet mask

 

6.

6 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?

the IP address of the host

the default gateway for the host

the primary DNS server for the host

the home page address for the host

 

7.

CCNA1FinalExamV4.0Answers2011 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection?

The data is automatically encrypted.

A Telnet server process is running on PC1.

The connection is made through a VTY session on the router.

A GET request was sent to RouterB to retrieve data during this session.

 

8. Which three addresses are private IP addresses? (Choose three.)

10.0.0.1

46.1.1.88

172.31.31.10

172.32.16.10

192.168.8.8

 

9.

CCNA1PracticeFinalExamAnswers thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?

Hosts A and B are not on the same subnet as host C.

The IP addresses on the router serial interfaces are wrong.

The subnet mask on host C is improperly configured.

The FastEthernet interface fa0/0 of router 1 is wrongly configured.

 

10. Which OSI layer addressing is required to route packets between two networks?

Layer 1

Layer 2

Layer 3

Layer 4

 

11. What is the effect of using the Router# copy running-config startup-config command on a router?

The contents of ROM will change.

The contents of RAM will change.

The contents of NVRAM will change.

The contents of flash will change.

 

12. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC?

Use the ipconfig /all command at the host’s command prompt.

Use the ping 127.0.0.1 command at the command prompt.

Use the traceroute command at the command prompt to identify any failures on the path to the gateway.

Use FTP to check for connectivity to remote sites.

Download a troubleshooting tool from the PC manufacturer’s website.

 

13. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0?

255.255.0.0

255.255.254.0

255.255.252.0

255.255.248.0

255.255.240.0

255.255.255.128

 

14.

CCNAFinal thumb2 CCNA 1 Final Exam Answers 2011

Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

only computer D

only computer A and computer D

only computer B, computer C, and computer D

all computers

 

15.

CiscoCCNA1FinalExamAnswers thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.)

The cable is suitable for connecting a switch to a router Ethernet port.

The cable is suitable for connecting dissimilar types of devices.

The cable is unusable and must be rewired.

The cable is terminated in a way that the transmit pin is wired to the receive pin.

The cable simulates a point-to-point WAN link.

 

16.

NetworkFundamentalsFinalExamAnswers thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. Which layered network model is shown in the diagram?

Cisco

IETF

OSI

TCP/IP

 

17. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration?

Reboot the router.

Use no version of the commands that are issued.

Issue the erase startup-config command, and then reboot the router.

Issue the erase running-config command, and then reboot the router.

 

18.

CCNA2011 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?

Host A is assigned a network address.

Host B is assigned a multicast address.

Host A and host B belong to different networks.

The gateway addresses are network addresses.

 

19.

CCNAExam2011 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?

CCNAAnswers2011 thumb CCNA 1 Final Exam Answers 2011

 

20. What can the user do from the command prompt, Router(config-line)# ?

Configure one of the network interfaces.

Configure one of the physical or virtual lines.

Verify the running configuration on the device.

Configure the parameters for one of the routing protocols.

 

21.

CCNAFinal2011 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway?

Use the ping 127.0.0.1 command.

Use the ipconfig command.

Use the ipconfig/all command.

Use the ping 10.0.0.254 command.

 

22.

FinalExamExam2011 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem?

Configure the description at interface serial 0/0/0.

Configure an IP address on interface serial 0/0/0.

Remove the no shutdown command at interface serial 0/0/0

Reboot the router.

 

23. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure?

console

enable

enable secret

VTY

 

24. What are two purposes for configuring a banner on a router? (Choose two.)

to announce system downtime

to prevent unauthorized access to the router

to provide a description of interface connections

to assist in legal prosecution for unauthorized access

to provide a welcome message to users who access the router

 

25.

CCNA1FinalExamAnswers2011 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts?

Use the ipconfig command at the host.

Use the ipconfig/all command at the destination.

Use the tracert command at the host.

Use the ping command at the destination.

 

26.

Cisco thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. Which list refers only to end devices?

D,E,F,G

A,H,B,C

A,D,E,F

A,D,E,G

 

27. When must a router serial interface be configured with the clock rate command?

when the interface is functioning as a DTE device

when the interface timers have been cleared

when the connected DTE device is shut down

when the interface is functioning as a DCE device

 

28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?

CCNA thumb CCNA 1 Final Exam Answers 2011

 

29.

CCNAAnswers thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.)

application layer

presentation layer

session layer

transport layer

network layer

data link layer

physical layer

 

30. What happens when a host station receives a frame that contains its own MAC address in the destination field?

The Layer 2 information is removed and the frame is pushed up to Layer 3.

The host station will copy the information to its buffers and send it back out.

The frame originated from the host and will be ignored.

The Layer 3 information is added to the frame.

 

31.

FinalExam thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network?

R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network.

R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24.

R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24.

R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

 

32. What type of network is maintained if a server takes no dedicated role in the network?

mainframe

client/server

peer-to-peer

centralized

 

33. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected?

hub

router

switch

firewall

 

34. Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmission of data?

internet

transport

application

network access

 

35. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0?

30

256

2046

2048

4094

4096

 

36. Which service is used when the nslookup command is issued on a computer?

FTP

DNS

DHCP

Telnet

 

37. Which process provides the means to send and receive data when running multiple applications at the same time on a computer?

interleaving

sequencing

segmentation

acknowledgement

 

38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)

10.1.12.79/28

10.1.12.113/28

10.1.12.32/28

10.1.11.5/27

10.1.11.97/27

10.1.11.128/27

 

39. What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco router?

Data stored in RAM will be removed.

Data stored in NVRAM will be erased.

Information in flash memory will be removed.

Flags in the configuration register will be set to 0.

Both the startup-config and the running-config will be erased.

 

40.

Exam2011 thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A?

IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2

IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17

IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5

IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1

IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

 

41. What is the Cisco IOS?

system software for Cisco devices

Read Only Memory in Cisco devices

non-volatile storage for device configurations

an initial operating system that is used for boot functions

 

42. Which router configuration mode will require user authentication if an administrator issues the enable secret command?

user executive mode

privileged executive mode

global configuration mode

service specific configuration mode

 

43. Which command or commands will require authentication to access the privileged exec mode?

RTRA(config)# enable secret cisco
RTRA(config)# service password encryption

RTRA(config)# line con 0
RTRA(config-line)# login
RTRA(config-line)# password cisco

RTRA(config)# line vty 0 4
RTRA(config-line)# login
RTRA(config-line)# password cisco

 

44. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error?

access point

host

hub

router

switch

 

45. Which statement is true about Layer 3 addresses?

They are physical addresses.

They are used in routing decisions.

They are only used on local networks.

They are altered each time a packet crosses a router.

 

46.

Final thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?

Exam thumb CCNA 1 Final Exam Answers 2011

Answers thumb CCNA 1 Final Exam Answers 2011

 

47. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission?

application

presentation

session

transport

 

48.

CiscoAnswers thumb CCNA 1 Final Exam Answers 2011

Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?

10.0.0.254

192.168.0.249

192.168.0.250

10.0.1.254

 

49. An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing?

Ctrl-D

Ctrl-K

Ctrl-R

Ctrl-Z

 

50. Which option represents a point-to-point logical topology diagram?

Computer thumb CCNA 1 Final Exam Answers 2011

 

51. Which physical component is used to access and perform the initial configuration on a new unconfigured router?

CiscoExam thumb CCNA 1 Final Exam Answers 2011

CCNAExam thumb CCNA 1 Final Exam Answers 2011

 

52. Which option shows how a router will route packets to a remote network?

CCNACommand thumb CCNA 1 Final Exam Answers 2011

How many host addresses may be assigned when using the 128 107 0 0 network address with a subnet mask of 255 255 248 0?, Refer to the exhibit The nslookup command that is shown was issued on a Windows PC host What does the 10 32 5 74 address represent?, Which option represents a point-to-point logical topology diagram?, Refer to the exhibit What three statements are true about the IP configuration that is shown? (Choose three ), refer to the exhibit the network administrator remotely accesses the cli of routerb from pc1 using a secure connection which statement is true about this connection?, Refer to the exhibit PC1 is unable to access PC2 To troubleshoot this problem the technician needs to confirm that the next hop interface is operational Which default gateway address should the technician ping from PC1 to confirm this?, Refer to the exhibit The serial interface of the router was configured with the use of the commands that are shown The router cannot ping the router that is directly connected to interface serial 0/0/0 What should the network technician do to solve this p, Refer to the exhibit A technician uses the nslookup command on the PC and views the output that is displayed in the exhibit What is the IP address of the primary domain name server used by the host?, Which statement is true about Layer 3 addresses?, Which service is used when the nslookup command is issued on a computer?

101 Responses - Add Yours+

  1. Simon says:

    Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this?

    10.0.0.254

    192.168.0.249

    192.168.0.250

    10.0.1.254

    Could you review this question I’m not sure its correct… I think the answer is the last option. Please reply urgently

    • ladyme says:

      the 1st option is the ip add that is being assigned to the Fa0/0 of the router…

    • usama says:

      10.0.0.254

      is right .. basic concept .. any pc with switch or not attach with router by interface . this interface is the gatway for pc ( users )

    • Michelle says:

      The question is asking the default gateway of PC1, of course it’s 10.0.0.254. 10.0.1.254 is PC2′s default gateway

      • Rupom says:

        i think ans will be 192.168.0.250/10.0.1.254 …
        because,here the technician needs to confirm that the next hop interface is operational or not.
        10.0.0.254 will not give u any information of next hop..

        • Shashipriya89 says:

          Answer is 10.0.0.254 …because question ask “…..ping from PC1 to confirm this?” its from PC 1 not from PC 2 ..!!

        • paul says:

          I think when you are trying to troubleshoot you need to ping the closest gateway or Ip address to you and if It goes through than ping the next one over. Therefor pinging the PC 1s default gateway would seem more reasonable to me and pinging pc 2

    • Knight2000 says:

      The question is “WHICH DEFAULT GATEWAY ADDRESS SHOULD THE TECH PING FROM PC 1″ we know that 10.0.0.254 and 10.0.1.254 are both default gateways. Now in order to check that the next hop interface is operational you would have to ping address 10.0.1.254 because pinging 10.0.0.254 wouldnt really tell you anything.

      • shahzad says:

        u r right..
        we need to ping router b default gateway..not A

        • Lordking says:

          I think the Gateway 10.0.0.254 is correct. As the name implies, its the next hop from the PC and gateway for the PC. So to find out whether the PC can communicate with the remote network, it has to first of all check if, it can ping its default-gateway which is the router bearing 10.0.0.254.

    • untiteled says:

      192.168.0.249 is the correct answer. They’re asking about PROPER INTERFACE ON DEFAULT ROUTER -> ping to the interface of PC1`s default router.

      • Bob says:

        Nooo, it is not asking what interface to ping its asking what to do to find out if the interface is still operational.
        The question is which default gateway address is to ping. Pls dont confuse ppl here…
        The next hop (A ROUTER) in case for PC1 will be 10.0.1.254

        • romanofwa says:

          I think the problem could be anywhere between PC1 and PC2.First step is to ping PC1 default gateway which is 10.0.0.254 if this ping is successful than I can ping next default gateway 10.0.1.254. If ping 10.0.1.254 first and it’s not successful doesn’t mean ping to 10.0.0.254 will be successful.So I believe the answer is 10.0.0.254

  2. Newbie says:

    MY TWO CENTS WORTH..
    Q.3
    Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection?

    The SSH service is used to connect PC1 to RouterB. “Question askes for a SECURE connection, telnet is not secure.

    Q.4
    Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.)

    The network on which this computer resides can have 30 hosts.
    The computer is unable to communicate outside of the local network.”The gateway address is on a different subnet, this has a 224 mask networks hop in 32″
    The address that is assigned to the computer represents private addressing

    Q.8
    Which three addresses are private IP addresses? (Choose three.)
    10.0.0.1
    172.31.31.10.”Read question Properly..Choose 3″
    192.168.8.8

    Q.9
    The subnet mask on host C is improperly configured. “Notice it has a /27, it should be /28. A and B are on the 172.16.31.96 – 172.16.31.111, C is on 172.16.31.80 – 172.16.31.95.

    Q.28
    Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?
    192.168.0.0 255.255.0.0 /16
    172.16.0.0 255.240.0.0 /12
    10.0.0.0 255.0.0.0 /8

    Q.37
    Which process provides the means to send and receive data when running multiple applications at the same time on a computer?
    Segmentation

    Q.49

    Ctrl-R Redisplays a line

  3. jessie says:

    43. Which command or commands will require authentication to access the privileged exec mode?

    RTRA(config)# enable secret cisco
    RTRA(config)# service password encryption

    RTRA(config)# line con 0
    RTRA(config-line)# login
    RTRA(config-line)# password cisco

    RTRA(config)# line vty 0 4
    RTRA(config-line)# login
    RTRA(config-line)# password cisco

    Could you review this question I’m not sure its correct… I think the answer is the first option. Please reply urgently

    • usama says:

      authentication … so this will be in sesion like line vty

      RTRA(config)# line vty 0 4
      RTRA(config-line)# login
      RTRA(config-line)# password cisco

      is right

    • Jae says:

      The answer should be:

      RTRA(config)# enable secret cisco
      RTRA(config)# service password encryption

      since the question is asking about privileged exec mode not telnet session.

      • Vanessa says:

        I think so too. enable secret is for privilege-exec authentication

      • emil says:

        But “service password encryption” will not help you at all to authenticate. It will just encrypt passwords at show running config

      • Lusion says:

        Enable secret will only encrypt the password but does not require login. That what the login command is for.

        RTRA(config)# line vty 0 4
        RTRA(config-line)# login
        RTRA(config-line)# password cisco

        This is the correct answer and you can reverse the commands to make more sense when setting up the router.

        RTRA(config)# line vty 0 4
        RTRA(config-line)# password cisco
        RTRA(config-line)# login

        Doing it that way actually makes more sense.

        • Aurora says:

          RTRA(config)# line vty 0 4
          RTRA(config-line)# login
          RTRA(config-line)# password cisco

          This command is used to make an authentication when the users try to access an device by telnet.
          So, the correct answer is
          RTRA(config)# enable secret cisco

          Since this command is already encrypted, then need no any other command to make so.

          This command :
          RTRA(config)# service password encryption
          is used to encrypt the password that you put on an authentication of both line console and vty.

        • Patrol form ZP says:

          Ofcourse the first answer is correct. They ask about privilege exec mode, and “enable secret password” doing it. Try in PT on any device:
          enable
          conf t
          enable secret cisco
          exit
          exit

          and then try to login in to privilege exec mode. The system asku you about the password(cisco).

          “service password encryption” is not required and this command don’t have influence on seting password for privileged exec mode.

        • dave says:

          yeah…that’s the correct answer.

    • Knight2000 says:

      Remember is questions like this that get a lot of people. The question is about “Authentication to access PRIVILEGED EXEC MODE” they are not asking you about loging into the router which would require a login command. enable secret cisco and service password encryption would make the router ask you for a password to access privileged mode. Which makes the first option right.

    • basho says:

      its easy brova
      RTRA= user exec mode
      RTRA# =user priviledge mode
      RTRA(config)# global config mode

      kk.reach me anytime

  4. jessie says:

    9.

    Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?

    Hosts A and B are not on the same subnet as host C.

    The IP addresses on the router serial interfaces are wrong.

    The subnet mask on host C is improperly configured.

    The FastEthernet interface fa0/0 of router 1 is wrongly configured.

    Could you review this question I’m not sure its correct… I think the answer is the last option. Please reply urgently

    • usama says:

      Q9

      The subnet mask on host C is improperly configured.

      is the right answer

      • Satman says:

        Answer C is maybe expected, but it is not the right one!!
        The question is:
        Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem?
        … and it is not because of improper subnet mask. Even with the wrong mask you will be able to ping host A from host C!!

        So IMHO, none of the answers are right!!!

        • Satman says:

          Yes, I have tried it in packet tracer and the problem does not exist. You can ping hosts A and B regardless of subnet mask on host C.

          So the question is stupid !!

          • keks says:

            No, packet tracer is stupid (only emulator). Try connecting PC to a router with different subnet mask than the router interface has – even arp requests are not possible as the broadcast address is different. The router will simply not listen to host’s broadcasts.

          • Mat says:

            The only reason why you can ping it’s because your in the same subnet (and for some reason packet tracer doesn’t care)… now router 2 and host C are not even in the same subnet.

  5. Net says:

    No it isnt were pinging to default gateway (its a next hop) from PC1 and thats 10.0.0.254.

  6. usama says:

    Q3

    The connection is made through a VTY session on the router.

    about ssh secure the content
    vty secure username and password ( connection )

    • tyny says:

      IF WE READ THIS “Choosing a SSH Client
      SSH (or Secure Shell) is a protocol that can be used to log into a remote machine (your Virtual Server) and provide secure encrypted communications between your Virtual Server and your local computer. All of the commands you would use in a Telnet client, you can use in an SSH client. The only difference is that the communication is made via encrypted channels to and from your Virtual Server.
      ” i think the answer is “The SSH service is used to connect PC1 to RouterB.

  7. Tzvetan says:

    What about Q2….?
    Is the answer “Neighboring routers are polled to find the best path.” right?

  8. tyny says:

    Q43 answer is “RTRA(config)# enable secret cisco
    RTRA(config)# service password encryption


    Q9 answer is “The subnet mask on host C is improperly configured” must be /28 like router2 fa 0/0

  9. ashwin2011 says:

    hey guys in Q3
    The network administrator remotely accesses the CLI of RouterB from PC1 using a SECURE connection

    we all know that telnet is not secure, is that answer right ?

    should it not be d.

    *The SSH service is used to connect PC1 to RouterB.

  10. X says:

    8. Which three addresses are private IP addresses? (Choose three.)

    172.31.31.10 is missing.

  11. daisy says:

    banner motd messages, im sure that is the wrong answer, should it not be to prevent un authorised access and assist in legal prosecution

    • Ether says:

      A banner doesn’t prevent anything, it merely provides some text. As such you can use it only for a warning or to let users know something. It can’t actually do anything practical, like preventing access.

      • D says:

        I agree, a lot of people seem to be saying it’s to prevent unauthorized access, but it merely provides a text welcome or legal message.

        If you want to prevent access, then a password is implemented. Get your facts straight before confusing others.

  12. menna says:

    about Q24 i think the answer will be;
    1-to prevent unauthorized access to router
    2-to provide a welcome message to users who access the router

    is that answer true or …..?

    • Mat says:

      So, you think when putting a banner in your router it will prevent me from accessing your router? Let’s do this in a hacker perspective…

      • mofo says:

        “Configuring an appropriate banner is part of a good security plan. At a very minimum, a banner should warn against unauthorized access. Never configure a banner that “welcomes” an unauthorized user.” from he ccna

    • Hanna says:

      Correct answer would be:

      to announce system downtime

      to assist in legal prosecution for unauthorized access

      100% :)

  13. Patrol form ZP says:

    Q4. I’m sure that answer: “The IP address that is assigned as the default gateway is valid for this host” is incorrect. The computer never reaches his default gateway, why? Because when computer do operation AND on 192.168.34.1(PC’s default gateway) and his subnet mask, computer will be think that this IP is from other subnet. When frame is adressed to PC which is from the same subnet(f.e: 192.168.34.48), source computer send packed to the switch, and then to the destination PC, so the correct answer is: “The computer is unable to communicate outside of the local network.”

  14. Patrol form ZP says:

    Q19. I think the correct answer is A:
    R1#copry running-config tftp
    Name of configuration file to write [R1-run]? R1-config
    Write file R1-config to 192.168.3.2? [confirm]

    In question we see: the technican save the configuration R1, then “he has made several changes”, so the wrong configuration is in running-config.

    • Mat says:

      So why would you want to make a backup copy of the running config if it’s wrong? Re-read this “A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes.” So the runing config is not good and wants to go back to the start up config and wants to as a backup before reloading.

  15. Revital says:

    Refer to question 40
    Could you review this question I’m not sure its correct… I think the answer is IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18

    the next hop is 192.168.100.18

    thanks
    Revital

  16. Carlos says:

    24. What are two purposes for configuring a banner on a router? (Choose two.)

    to announce system downtime

    to prevent unauthorized access to the router

    to provide a description of interface connections

    to assist in legal prosecution for unauthorized access

    to provide a welcome message to users who access the router

    correct answers would :
    to prevent unauthorized access to the router
    to assist in legal prosecution for unauthorized access

  17. sasas says:

    man i think it s because of the routing table

  18. Yas says:

    hey guys,

    im planning on taking the test next month, are these the answers to most of the CCNA test questions? is this enough to take the test?

    • Bla says:

      No it isn’t.
      There is a pool of mor than 500 questions, where you will get about 50 to your exam.
      Some of my classmates took the exam last week, and they said that there were only about 10 questions they have found in the internet. The other 40 must be solved by yoursefl, and 10 correct answers isn’t enough to pass the exam

    • Ether says:

      I have taken final exam two day ago, i advice u to study these qeustions (WITH THE CORRECTIONS OF THE USERES REPLIED),
      And study the Version of 2010 of these answers.. plus so much little information of the chapters, i had 75% in my exam..
      Good Luck :)

  19. A user says:

    At q28 the answer is C : subnet masks are /16 /12 /8

  20. A user says:

    Q49 the answer is CTRL-R …[c]

  21. Temo says:

    28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?
    right answer is:
    192.168.0.0 255.240.0.0
    172.16.0.0 255.255.0.0
    10.0.0.0 255.0.0.0

    • Claus Marnix says:

      The correct answer is

      10.0.0.0 255.0.0.0 /8
      172.16.0.0 255.240.0.0 /12
      192.168.0.0 255.255.0.0 /16

      see chapter 6
      6.2.5.1

  22. aj says:

    43. Which command or commands will require authentication to access the privileged exec mode?

    correct answer (also will encrypt password)
    RTRA(config)# enable secret cisco
    RTRA(config)# service password encryption

    This is for console password
    RTRA(config)# line con 0
    RTRA(config-line)# login
    RTRA(config-line)# password cisco

    This is for TELNET password
    RTRA(config)# line vty 0 4
    RTRA(config-line)# login
    RTRA(config-line)# password cisco

  23. ar3s says:

    Can somebody explain me this question?

    38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.)

    10.1.12.79/28

    10.1.12.113/28

    10.1.12.32/28

    10.1.11.5/27

    10.1.11.97/27

    10.1.11.128/27

    • basho says:

      hey its alright
      here is what i have for u

      Ans=10.1.12.32/28

      10.1.11.97/27 1.e 32 +64=96 so u can use it as subnetting VLSM

      10.1.11.128/27

      kk

    • untiteled says:

      10.1.12.79/28 – broadcast address for 64-79 network

      10.1.12.113/28 – valid

      10.1.12.32/28 – network address for 32-47 network

      10.1.11.5/27 – valid

      10.1.11.97/27 – valid

      10.1.11.128/27 – network address for 128- 159 network.

  24. CiscoSlayer says:

    Q28 read from the following website on page 3. Case closed

    http://tools.ietf.org/html/rfc1918

  25. hitham says:

    is this web site for CCNA 640-802 ?

  26. Tanita says:

    on q8, which one is the other private address?

  27. alea says:

    q.5 gateway doesn’t belong to right subnet.

  28. fuad says:

    Q48:
    we need to confirm that the next hop interface is operational or not?
    we must ping the remote default gateway address. the technician must ping from PC1 to confirm this is 10.0.1.254. because if we ping the near default gateway 10.0.0.254, we do not learn the state of the connection between the routers

  29. Mohammed says:

    # 18 is wrong
    Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this?
    it asked for whats the reason for this problem and gateway address is always the network address.

    Answer is #3 Host A and host B belong to different networks.

    • Max says:

      So what A and B belong to different networks? They are connected by Router.
      Correct answer is still:
      -> #The gateway addresses are network addresses.

  30. Chris says:

    Hello guys , the question on the final exam will be , in big portion , the same?

  31. Laurentiu says:

    Q.49 What CLI keystrokes can be entered to return to the line that the administrator was typing?
    ANSWER: ctrl+Z

  32. NOOR says:

    Thank you very much
    really this site is very helpful

  33. NOOR says:

    the new QUESTION:
    refer to the exhibit.. in 10BASE-T Ethernet RJ45 connectors which pairs represents to unused pairs?
    pair2,pair4
    pair1,pair3
    pair1,pair4
    pair3,pair2
    the answer is the third….
    note that the 10BASE-T is T568B types

  34. jaye says:

    the last ans in question 4 is not correct

    • NOOR says:

      yes you are right
      the last answer in Q4 is not correct because the gateway in different network so the IP invalid

  35. Peter says:

    For question 28, RFC 1918 states:
    “Rekhter, et al Best Current Practice [Page 3]

    RFC 1918 Address Allocation for Private Internets February 1996

    3. Private Address Space

    The Internet Assigned Numbers Authority (IANA) has reserved the
    following three blocks of the IP address space for private internets:

    10.0.0.0 – 10.255.255.255 (10/8 prefix)
    172.16.0.0 – 172.31.255.255 (172.16/12 prefix)
    192.168.0.0 – 192.168.255.255 (192.168/16 prefix)”

    It is about 2/5 of the way down on the page. This means that C is correct and not A because class C subnet mask is /16 255.255.0.0). Hope this helps.

  36. SalmanAli says:

    Q4
    The Correct answers are

    The network on which this computer resides can have 30 hosts.
    The computer is unable to communicate outside of the local network.
    The address that is assigned to the computer represents private addressing.

  37. SalmanAli says:

    Q 2
    The right answer is

    The packet will be discarded.
    The packet will be forwarded to a default route if one is present.

Leave a Reply