Please enter your email:

1. BPDUGuard should be only be configured on ports that have which feature enabled?

 
 
 
 

2. Which of the following devices can be used to interconnect broadcast domains? (Choose 2.)

 
 
 
 
 

3. Which of the following is not a Rapid Spanning Tree Protocol (RSTP) port state?

 
 
 
 

4. The PING utility uses which of the following protocols to check for network connectivity to an IP address?

 
 
 
 
 

5. A PC requires which of the following configuration parameters in order to Telnet to a host on a remote subnet? (Choose 3.)

 
 
 
 
 

6. ARP can perform which of the following functions?

 
 
 
 

7. You are working with a Class B network with the private IP address of 172.16.0.0 /16. You need to maximize the number of broadcast domains, where each
broadcast domain can accommodate 1000 hosts. What subnet mask should you use?

 
 
 
 
 

8. CDP (Cisco Discovery Protocol) resides at which layer of the OSI Model?

 
 
 
 
 

9. You wish to Telnet into a Layer 2 Cisco Catalyst switch. Which of the following must be configured on the switch before you can Telnet into the switch?

 
 
 
 
 

10. You are assigning IP addresses to hosts in the 192.168.4.0 /26 subnet. Which two of the following IP addresses are assignable IP addresses that reside in that subnet?

 
 
 
 
 

11. Which of the following is considered to be a reliable Transport Layer protocol

 
 
 
 
 

12. Which of the following are security best practices when setting up a Cisco router? (Choose all the apply.)

 
 
 
 
 

13. On an IEEE 802.1Q trunk, what do we call the VLAN that is not tagged by 802.1Q?

 
 
 
 
 

14. Which of the following is not a Rapid Spanning Tree Protocol (RSTP) port state?

 
 
 
 

15. A PC has just booted up and wants to communicate with a host on a remote subnet. The PC knows the IP addresses of its default gateway and the remote host. However, in order to properly construct a frame, the PC needs an appropriate destination MAC address. What MAC address does the PC need to learn, and what protocol will the PC use to learn that MAC address?

 
 
 
 

16. Which of the following technologies allows VPN tunnels to be setup and torn down on an as-needed basis?

 
 
 
 

17. A router resides at what layer of the TCP/IP Model?

 
 
 
 
 

18. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet mask. How many subnets can be created by using this subnet mask?

 
 
 
 
 

19. You’re viewing the running configuration on a Cisco router and notice the enable secret command. The command begins with enable secret, followed by the number 9, followed by a hash digest. What does the 9 indicate?

 
 
 
 

20. Identify the three layers of Cisco’s traditional hierarchical network design model. (Choose 3.)

 
 
 
 
 

21. Of the following protocols, select the ones that are UDP-based. (Choose 2)

 
 
 
 
 

22. A host in your network has been assigned an IP address of 192.168.181.182 /25. What is the subnet to which the host belongs?

 
 
 
 

23. Which of the follow are dynamic routing protocols? (Choose 2.)

 
 
 
 
 

24. Typically, HTTP uses what Transport Layer protocol and what port number?

 
 
 
 
 

25. What is the directed broadcast address of a subnet containing an IP address of 172.16.1.10 /19?

 
 
 
 
 

Question 1 of 25