CISCO Certification Questions

Q:

Which of the following is true when describing a multicast address?

A) Packets addressed to a multicast address are delivered to a single interface B) packets are delivered to all interfaces identified with the address. This is also called a one-to-many address
C) A multicast address identifies multiple interfaces and is delivered to only one address. This address can also be called one-to-one-of-many D) These addresses are meant for nonrouting purposes,but they are almost globally unique, so it is unlikely they will have an address overlap
 
Answer & Explanation Answer: B) packets are delivered to all interfaces identified with the address. This is also called a one-to-many address

Explanation:

Packets addressed to a multicast address are delivered to all interfaces identified with the multicast address, the same as in IPv4. It is also called a one-to-many address. You can always tell a multicast address in IPv6 because multicast addresses always start with FF.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4173
Q:

At which layer of the OSI model would you assume the problem is if you type show interface serial 1 and receive the following message?

Serial 1 is down, line protocol is down

A) Physical layer B) Data Link layer
C) Network layer D) None
 
Answer & Explanation Answer: A) Physical layer

Explanation:

If you see that a serial interface and the protocol are both down, then you have a physical layer problem. If you see serial 1 is up, line protocol is down, then you are not receiving (Data Link) Keepalives from the remote end.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4157
Q:

You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 . Which of the following lists will you use?

A) access - list 10 deny 192.168.160.0 255.255.224.0 B) access - list 10 deny 192.168.160.0 0.0.191.255
C) access - list 10 deny 192.168.160.0 0.0.31.255 D) access - list 10 deny 192.168.0.0 0.0.31.255
 
Answer & Explanation Answer: C) access - list 10 deny 192.168.160.0 0.0.31.255

Explanation:

The range of 192.168.160.0 to 192.168.191.0 is a block size of 32. The network address is 192.168.160.0 and the mask would be 255.255.224.0, which for an access list must be a wildcard format of 0.0.31.255 . The 31 is used for a block size of 32. The wildcard is always one less than the block size.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 4150
Q:

Which of the following commands sets a trunk port on a 2960 switch?

A) truck on B) truck all
C) switchport trunk on D) switchport mode trunk
 
Answer & Explanation Answer: D) switchport mode trunk

Explanation:

To set a switch port to trunk mode, which allows the data of all VLAN information to pass down the link, use the switchport mode trunk command. 

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4120
Q:

Which of the following devices do not operate at all levels of the OSI model?

A) Network management stations (NMSs) B) Routers
C) Web and application servers D) Network hosts
 
Answer & Explanation Answer: B) Routers

Explanation:

Routersoperate no higher than layer 3 of the OSI model.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

1 4119
Q:

What command will display the forward / filter table?

A) Show mac filter B) show run
C) show mac address-table D) show mac filter-table
 
Answer & Explanation Answer: C) show mac address-table

Explanation:

The Command show mac address-table displays the forward/filter table on the switch.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 4098
Q:

Mention different memories used in a CISCO router ?

Answer

Different Memories used in a CISCO router are as follows :


NVRAM stores the startup configuration file.

DRAM stores the configuration file that is being executed.

Flash Memory – stores the Cisco IOS.

 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA
Job Role: Network Engineer

7 4083
Q:

When creating a pool of global address, which of the following can be used instead of the netmask command?

A) / (slash notation) B) prefix - length
C) no mask D) block - size
 
Answer & Explanation Answer: B) prefix - length

Explanation:

Instead of the netmask command, you can use the prefix-length length statement.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 3996