CCNA 2 Module 5 V3.1 Answers

1. If boot system commands have been configured, which of the following could happen if a router fails to obtain an IOS image from the primary sources during bootup?

The router will load a subset of a full IOS version from system ROM.

The router will attempt to reboot two times before failing.

The router will load the last good IOS image from NVRAM.

The administrator will be prompted to load a valid IOS image.


2. Which command is used to change the order in which the router looks for system bootstrap information?





config system bootstrap

CCNA 2 Module 4 V3.1 Answers


CCNA 2 Module 4 V3.1 Answers (1)
Pings between Atlanta and Dallas are successful. If a hostname table or DNS connection is not available, which command will successfully establish a remote connection from Atlanta to Dallas via Telnet?

Atlanta> connect Dallas



Atlanta# telnet Dallas


2. Transmitting type length values (TLVs) inside advertisements is a process used by CDP to provide information about neighboring devices. What information is displayed by these TLVs? (Choose three.)

interface information of the connected device

all networks connected to the neighboring device

name of the connected device

routing protocol used on the neighboring device

holdtime for advertisements

CCNA 2 Module 3 V3.1 Answers

CCNA 2 Module 3 V3.1 Answers

1. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface

console interface

Ethernet interface

secret EXEC mode

privileged EXEC mode

router configuration mode


2. Which command sequence will permit access to all five router virtual terminal lines with a password of cisco?

Router(config-line)#config telnet
Router(config-line)# line vty 0 5
Router(config-line)# password cisco

Router(config)# line vty 0 4
Router(config)# password cisco

Router(config)# line vty 0 4
password cisco
Router(config-line)# login

Router(config-line)# config telnet
Router(config-line)# password cisco
Router(config-line)# sessions 0 4

CCNA 2 Module 2 V3.1 Answers

CCNA 2 Module 2 V3.1 Answers

1. Which keystrokes can be used to return to the privileged mode from the interface configuration mode?


Ctrl-Shift-6, then X




2. Which connection method can be used to perform the initial configuration of a router?

use a serial connection of a computer connected to the console port of a router

telnet to the router through a serial port

use a vty port through the Ethernet interface

use a modem connected to the AUX port of the router

CCNA 2 Module 1 V3.1 Answers

CCNA 2 Module 1 V3.1 Answers

1. Which of the following devices are used in the construction of a WAN? (Choose three.)



communication servers



multi-port repeaters


2. Which basic components do a router and a standard desktop PC have in common? (Choose three.)


hard drive

input/output interfaces



system bus

CCNA 1 Practice Final Exam Answer V3.1

1. When a network administrator applies the subnet mask to a Class A address, for any given subnet, how many IP addresses are available to be assigned to devices?








2. What is the maximum distance that 10BASE-T will transmit data before signal attenuation affects the data delivery?

100 meters

185 meters

300 meters

500 meters

CCNA 1 Final Exam Answers V3.1

1. A router determines the path to deliver a packet. What layer of the OSI model does this fact represent?




data link




 CCNA 1 Final Exam Answers V3.1 (1)
Refer to the exhibit. A network administrator has configured a network after subnetting the network number Workstation 1 is not able to communicate with Workstation 2. What is the cause of this loss in communications?

Workstation 1 and Workstation 2 are on the same subnet.

The serial connections are using addresses from the LAN subnets.

Workstation 1 is not on the same network that the Router 1 LAN interface is on.

If routers are used in the network, IP addresses do not need to be subnetted.

CCNA 1 Module 11 V3.1 Answers

1. Which layer of the OSI model can provide a connection-oriented, reliable data transfer between two hosts?






2. Which protocol is used to transfer files from computer to computer but is considered connectionless?






CCNA 1 Module 10 V3.1 Answers

CCNA 1 Module 10 V3.1 Answers

1. How does a router decide where the contents of a received frame should be forwarded?

by matching destination IP addresses with networks in the routing table

by matching the destination IP address with IP addresses listed in the ARP table

by matching the destination MAC address with MAC addresses listed in the CAM table

by forwarding the frame to all interfaces except the interface on which the frame was received


2. Which device would add security to a network by not forwarding broadcasts?






CCNA 1 Module 9 V3.1 Answers


CCNA 1 Module 9 v3.1 (1)
Refer to the exhibit. Which two statements are correct in reference to the output shown? (Choose two.)

The LAN segment is subnetted to allow 254 subnets.

The DNS server for this host is on the same subnet as the host.

The host automatically obtained the IP addresses

The host received the IP address from a DHCP-enabled device on the local LAN segment.

The host is assigned an address of 00-50-8D-F1-EA-8D by the administrator.



CCNA 1 Module 9 v3.1 (2)
Refer to the exhibit. The small office LAN shown in the exhibit may eventually be connected to the Internet. According to Cisco best practice, which IP network addresses should be used?