CCNA 2 Chapter 2 V6.0 Answers

1. Why would a floating static route be configured with an administrative distance that is higher than the administrative distance of a dynamic routing protocol that is running on the same router?

to be used as a backup route

to be the priority route in the routing table

to act as a gateway of last resort

to load-balance the traffic

 

2. Which three IOS troubleshooting commands can help to isolate problems with a static route? (Choose three.)

show arp

tracert

show ip interface brief

ping

show ip route

show version

CCNA 2 Chapter 1 V6.0 Answers

1. What is the effect of configuring the ipv6 unicast-routing command on a router?

to prevent the router from joining the all-routers multicast group

to enable the router as an IPv6 router

to permit only unicast packets on the router

to assign the router to the all-nodes multicast group

 

2. Fill in the blank.

When a router receives a packet, it examines the destination address of the packet and looks in the _Routing_ table to determine the best path to use to forward the packet.

CCNA 1 Final Exam V6.0 Answers

1. Refer to the exhibit. If host A sends an IP packet to host B, what will the destination address be in the frame when it leaves host A?

what will the destination address be in the frame when it leaves host A?

172.168.10.99

172.168.10.65

DD:DD:DD:DD:DD:DD

AA:AA:AA:AA:AA:AA

BB:BB:BB:BB:BB:BB

CC:CC:CC:CC:CC:CC

 

2. Which example of malicious code would be classified as a Trojan horse?

malware that was written to look like a video game

malware that requires manual user intervention to spread between systems

malware that can automatically spread from one system to another by exploiting a vulnerability in the target

malware that attaches itself to a legitimate program and spreads to other programs when launched

CCNA 1 Chapter 11 V6.0 Answers

1. Which two actions can be taken to prevent a successful network attack on an email server account? (Choose two.)

Limit the number of unsuccessful attempts to log in to the server.

Never use passwords that need the Shift key.

Never send the password through the network in a clear text.

Distribute servers throughout the building, placing them close to the stakeholders.

Use servers from different vendors.

 

2. What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?

to direct all new files to the NVRAM

to clear the content of the NVRAM

to list the content of the NVRAM

to copy the directories from the NVRAM

CCNA 1 Chapter 10 V6.0 Answers

1. When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that would be desirable for a small- to medium-sized business?

IMAP

POP

HTTPS

SMTP

 

2. Which application layer protocol uses message types such as GET, PUT, and POST?

DHCP

DNS

POP3

SMTP

HTTP

CCNA 1 Chapter 9 V6.0 Answers

1. Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.)

SYN

FIN

PSH

URG

RST

ACK

 

2. What happens if part of an FTP message is not delivered to the destination?

The message is lost because FTP does not use a reliable delivery method.

The FTP source host sends a query to the destination host.

The entire FTP message is re-sent.

The part of the FTP message that was lost is re-sent.

CCNA 1 Chapter 8 V6.0 Answers

1. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.)

192.168.1.64/27

192.168.1.96/28

192.168.1.16/28

192.168.1.128/27

192.168.1.192/28

 

2. What is a result of connecting two or more switches together?

The size of the collision domain is increased.

The number of collision domains is reduced.

The size of the broadcast domain is increased.

The number of broadcast domains is increased.

CCNA 1 Chapter 7 V6.0 Answers

1. Which three IP addresses are private ? (Choose three.)

192.167.10.10

224.6.6.6

192.168.5.5

172.16.4.4

172.32.5.2

10.1.1.1

 

2. Match each description with an appropriate IP address. (Not all options are used.)

Match each description with an appropriate IP address

169.254.1.5 -> a link-local address

192.0.2.123 -> a TEST-NET address

240.2.6.255 -> an experimental address

172.19.20.5 -> a private address

127.0.0.1 -> a loopback address

CCNA 1 Chapter 6 V6.0 Answers

1. What is the purpose of the startup configuration file on a Cisco router?

To provide a limited backup version of the IOS, in case the router cannot load the full featured IOS

to facilitate the basic operation of the hardware components of a device

to contain the configuration commands that the router IOS is currently using

to contain the commands that are used to initially configure a router on startup

 

2. Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.)

password cisco

line vty 0 4

login

line console 0

interface fastethernet 0/0

enable secret cisco

CCNA 1 Chapter 5 V6.0 Answers

1. Refer to the exhibit. A switch with a default configuration connects four hosts. The ARP table for host A is shown. What happens when host A wants to send an IP packet to host D?

A switch with a default configuration connects four hosts

Host A sends out a broadcast of FF:FF:FF:FF:FF:FF. Every other host connected to the switch receives the broadcast and host D responds with its MAC address.

Host D sends an ARP request to host A.

Host A sends out the packet to the switch. The switch sends the packet only to the host D, which in turn responds.

Host A sends an ARP request to the MAC address of host D.

 

2. Which destination address is used in an ARP request frame?

0.0.0.0

255.255.255.255

FFFF.FFFF.FFFF

01-00-5E-00-AA-23

127.0.0.1