Please enter your email:

1. You are assigning IP addresses to hosts in the 192.168.4.0 /26 subnet. Which two of the following IP addresses are assignable IP addresses that reside in that subnet?

 
 
 
 
 

2. Which of the following are security best practices when setting up a Cisco router? (Choose all the apply.)

 
 
 
 
 

3. BPDUGuard should be only be configured on ports that have which feature enabled?

 
 
 
 

4. A PC has just booted up and wants to communicate with a host on a remote subnet. The PC knows the IP addresses of its default gateway and the remote host. However, in order to properly construct a frame, the PC needs an appropriate destination MAC address. What MAC address does the PC need to learn, and what protocol will the PC use to learn that MAC address?

 
 
 
 

5. A host in your network has been assigned an IP address of 192.168.181.182 /25. What is the subnet to which the host belongs?

 
 
 
 

6. CDP (Cisco Discovery Protocol) resides at which layer of the OSI Model?

 
 
 
 
 

7. On an IEEE 802.1Q trunk, what do we call the VLAN that is not tagged by 802.1Q?

 
 
 
 
 

8. Identify the three layers of Cisco’s traditional hierarchical network design model. (Choose 3.)

 
 
 
 
 

9. ARP can perform which of the following functions?

 
 
 
 

10. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet mask. How many subnets can be created by using this subnet mask?

 
 
 
 
 

11. Which of the following technologies allows VPN tunnels to be setup and torn down on an as-needed basis?

 
 
 
 

12. What is the directed broadcast address of a subnet containing an IP address of 172.16.1.10 /19?

 
 
 
 
 

13. Which of the following is considered to be a reliable Transport Layer protocol

 
 
 
 
 

14. Typically, HTTP uses what Transport Layer protocol and what port number?

 
 
 
 
 

15. You’re viewing the running configuration on a Cisco router and notice the enable secret command. The command begins with enable secret, followed by the number 9, followed by a hash digest. What does the 9 indicate?

 
 
 
 

16. A PC requires which of the following configuration parameters in order to Telnet to a host on a remote subnet? (Choose 3.)

 
 
 
 
 

17. You are working with a Class B network with the private IP address of 172.16.0.0 /16. You need to maximize the number of broadcast domains, where each
broadcast domain can accommodate 1000 hosts. What subnet mask should you use?

 
 
 
 
 

18. Which of the follow are dynamic routing protocols? (Choose 2.)

 
 
 
 
 

19. Which of the following devices can be used to interconnect broadcast domains? (Choose 2.)

 
 
 
 
 

20. A router resides at what layer of the TCP/IP Model?

 
 
 
 
 

21. Which of the following is not a Rapid Spanning Tree Protocol (RSTP) port state?

 
 
 
 

22. Of the following protocols, select the ones that are UDP-based. (Choose 2)

 
 
 
 
 

23. Which of the following is not a Rapid Spanning Tree Protocol (RSTP) port state?

 
 
 
 

24. The PING utility uses which of the following protocols to check for network connectivity to an IP address?

 
 
 
 
 

25. You wish to Telnet into a Layer 2 Cisco Catalyst switch. Which of the following must be configured on the switch before you can Telnet into the switch?

 
 
 
 
 

Question 1 of 25