Вы находитесь на странице: 1из 47

Tips For Programmer CCNA Tips Health Sport

Welcome Guest. Sign in or Signup

Find a Question
Rackmount your Cisco Rack mount kits for your ASA5505 and your Air WLC -2100 series www.rack m ount.it/cisrack Cisco Memory For Sale Find New & Refurb C isco Memory Free Shipping & Tech Support! www.Me m oryDe ale rs.com /Me m ory Prepare for Cisco's CCNA Online C C NA C ertification C ourses Get C isco C NA C ertified Now! www.e -le arningce nte r.com

85 Answers

CCNA 1 Final Exam Answers 2011


Tag: ccna 1 , ccna 1 final , ccna 1 final exam v4.0 answers 2011 , ccna 1 practice final exam answers , ccna 2011 , ccna answers 2011 , ccna exam 2011 , ccna final , ccna final 2011 , cisco ccna 1 final exam answers , exam 2011 , final exam , network fundamentals final exam answers

Asked by: Scott


Ads by Google Cisco CCNA Exam Cisco CCNA Cisco Systems CCNA CCNA Exam

1. Due to a security violation, the passwords must be changed. What information can be learned from the following configuration entries? (Choose two.) Router(config)# line vty 0 3 Router(config-line)# password c13c0 Router(config-line)# login The entries specify three Telnet lines for remote access. ==>The entries specify four Telnet lines for remote access. The entries set the console and Telnet password to "c13c0". Telnet access will be denied because the Telnet configuration is incomplete. ==>Access will be permitted for Telnet using "c13c0" as the password.

2. Which two actions could be taken by a router if a specific match is not made to a route in the routing table? (Choose two.) The packet will be discarded. The packet will be sent back to the source. The packet will be flooded out all interfaces.

==>Neighboring routers are polled to find the best path. ==>The packet will be forwarded to a default route if one is present.

3. Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection? The Telnet server process is running on PC1. ==>Only the exchange of the Telnet username and password is encrypted. The GET request is sent to RouterA to retrieve data. The SSH service is used to connect PC1 to RouterB.

4. Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) The prefix of the subnet mask is /26. ==>The network on which this computer resides can have 30 hosts. The computer is unable to communicate outside of the local network. ==>The address that is assigned to the computer represents private addressing. The IP address that is assigned to the computer is routable on the Internet. ==>The IP address that is assigned as the default gateway is valid for this host.

5. What information can be gathered by using the command netstat? the default gateway the routing protocol ==>active TCP connections the locally configured subnet mask

6. Refer to the exhibit. The nslookup command that is shown was issued on a Windows PC host. What does the 10.32.5.74 address represent?

the IP address of the host the default gateway for the host ==>the primary DNS server for the host the home page address for the host

7. Refer to the exhibit. A network administrator remotely accesses the CLI of RouterB from PC1 using Telnet. Which statement is true about this connection? The data is automatically encrypted. A Telnet server process is running on PC1. ==>The connection is made through a VTY session on the router. A GET request was sent to RouterB to retrieve data during this session.

8. Which three addresses are private IP addresses? (Choose three.) ==>10.0.0.1 46.1.1.88 172.31.31.10 172.32.16.10 ==>192.168.8.8

9. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? ==>Hosts A and B are not on the same subnet as host C. The IP addresses on the router serial interfaces are wrong. The subnet mask on host C is improperly configured. The FastEthernet interface fa0/0 of router 1 is wrongly configured.

10. Which OSI layer addressing is required to route packets between two networks?

Layer 1 Layer 2 ==>Layer 3 Layer 4

11. What is the effect of using the Router# copy running-config startup-config command on a router? The contents of ROM will change. The contents of RAM will change. ==>The contents of NVRAM will change. The contents of flash will change.

12. A PC can not connect to any remote websites, ping its default gateway, or ping a printer that is functioning properly on the local network segment. Which action will verify that the TCP/IP stack is functioning correctly on this PC? Use the ipconfig /all command at the hosts command prompt. ==>Use the ping 127.0.0.1 command at the command prompt. Use the traceroute command at the command prompt to identify any failures on the path to the gateway. Use FTP to check for connectivity to remote sites. Download a troubleshooting tool from the PC manufacturers website.

13. Which subnet mask will allow 2040 hosts per subnet on the IP network 10.0.0.0? 255.255.0.0 255.255.254.0 255.255.252.0 ==>255.255.248.0 255.255.240.0 255.255.255.128

14. Refer to the exhibit. When computer A sends a frame to computer D, what computers receive the frame?

==>only computer D only computer A and computer D only computer B, computer C, and computer D all computers

15. Refer to the exhibit. While configuring a network, a technician wired each end of a Category 5e cable as shown. Which two statements are true about this setup? (Choose two.) ==>The cable is suitable for connecting a switch to a router Ethernet port. ==>The cable is suitable for connecting dissimilar types of devices. The cable is unusable and must be rewired. The cable is terminated in a way that the transmit pin is wired to the receive pin. The cable simulates a point-to-point WAN link.

16. Refer to the exhibit. Which layered network model is shown in the diagram? Cisco IETF OSI ==>TCP/IP

17. An administrator makes changes to the default configuration of a router and saves them to NVRAM. After testing, it is discovered that the configurations did not have the desired effect and must be removed. What steps must be taken to remove the changes and return the router to the default configuration? Reboot the router. Use no version of the commands that are issued. ==>Issue the erase startup-config command, and then reboot the router. Issue the erase running-config command, and then reboot the router.

18.

Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this? Host A is assigned a network address. Host B is assigned a multicast address. Host A and host B belong to different networks. ==>The gateway addresses are network addresses.

19. Refer to the exhibit. A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. The technician wants to store a backup copy of the saved configuration on a TFTP server before reloading. Which action will cause the unmodified data to be saved on the TFTP server?

20. What can the user do from the command prompt, Router(config-line)# ? Configure one of the network interfaces. ==>Configure one of the physical or virtual lines. Verify the running configuration on the device. Configure the parameters for one of the routing protocols.

21. Refer to the exhibit. A PC is connected to a network. Which action will verify that the PC can communicate with its default gateway? Use the ping 127.0.0.1 command. Use the ipconfig command. Use the ipconfig/all command. ==>Use the ping 10.0.0.254 command.

22. Refer to the exhibit. The serial interface of the router was configured with the use of the commands that are shown. The router cannot ping the router that is directly connected to interface serial 0/0/0. What should the network technician do to solve this problem? Configure the description at interface serial 0/0/0.

==>Configure an IP address on interface serial 0/0/0. Remove the no shutdown command at interface serial 0/0/0 Reboot the router.

23. A technician is asked to secure the privileged EXEC mode of a switch by requiring a password. Which type of password would require this login and be considered the most secure? console enable ==>enable secret VTY

24. What are two purposes for configuring a banner on a router? (Choose two.) to announce system downtime to prevent unauthorized access to the router to provide a description of interface connections ==>to assist in legal prosecution for unauthorized access ==>to provide a welcome message to users who access the router

25. Refer to the exhibit. A PC is communicating with another PC on a remote network. The two networks are connected by three routers. Which action will help to identify the path between the hosts? Use the ipconfig command at the host. Use the ipconfig/all command at the destination. ==>Use the tracert command at the host. Use the ping command at the destination.

26. Refer to the exhibit. Which list refers only to end devices? ==>D,E,F,G

A,H,B,C A,D,E,F A,D,E,G

27. When must a router serial interface be configured with the clock rate command? when the interface is functioning as a DTE device when the interface timers have been cleared when the connected DTE device is shut down ==>when the interface is functioning as a DCE device

28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask?

29. Refer to the exhibit. Which two layers of the OSI model describe the same functions as the transport and internet layers of the TCP/IP model? (Choose two.) application layer presentation layer session layer ==>transport layer ==>network layer data link layer physical layer

30. What happens when a host station receives a frame that contains its own MAC address in the destination field? ==>The Layer 2 information is removed and the frame is pushed up to Layer 3. The host station will copy the information to its buffers and send it back out. The frame originated from the host and will be ignored. The Layer 3 information is added to the frame.

31. Refer to the exhibit. Host A is configured with the correct IP address for the default gateway of the router R1 FastEthernet0/1 interface. How will a packet that is sent from host A to host B be handled by the devices on the network? R1 will drop the packet because R1 does not have a specific route in its routing table to the 10.1.1.0/24 network. ==>R1 will forward the packet to its default gateway, the next hop router R2. R2 will forward the packet to the directly connected network 10.1.1.0/24. R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a default route to network 10.1.1.0/24. R1 will forward the packet to its default gateway, the next hop router R2. R2 will drop the packet because it does not have a route that is learned by a routing protocol to network 10.1.1.0/24.

32. What type of network is maintained if a server takes no dedicated role in the network? mainframe client/server ==>peer-to-peer centralized

33. In a network design project, a network designer needs to select a device to provide collision free connections to 40 hosts on the LAN. Which device should be selected? hub router ==>switch firewall

34. Which TCP/IP model layer creates additional overhead on network resources due to acknowledgments, tracking, and retransmission of data? internet ==>transport application network access

35. How many host addresses may be assigned when using the 128.107.0.0 network address with a subnet mask of 255.255.248.0? 30 256 ==>2046 2048 4094 4096

36. Which service is used when the nslookup command is issued on a computer? FTP ==>DNS DHCP Telnet

37. Which process provides the means to send and receive data when running multiple applications at the same time on a computer? interleaving ==>sequencing segmentation acknowledgement

38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.) 10.1.12.79/28 ==>10.1.12.113/28 10.1.12.32/28 ==>10.1.11.5/27 ==>10.1.11.97/27 10.1.11.128/27

39. What is the consequence of issuing the erase startup-config command in privileged EXEC mode on a Cisco router? Data stored in RAM will be removed. ==>Data stored in NVRAM will be erased. Information in flash memory will be removed. Flags in the configuration register will be set to 0. Both the startup-config and the running-config will be erased.

40. Refer to the exhibit. A network technician is trying to determine the correct IP address configuration for Host A. What is a valid configuration for Host A? IP address: 192.168.100.19; Subnet Mask: 255.255.255.248; Default Gateway: 192.16.1.2 ==>IP address: 192.168.100.20; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.17 IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18 IP address: 192.168.100.22; Subnet Mask: 255.255.255.240; Default Gateway: 10.1.1.5 IP address: 192.168.100.30; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.1.1 IP address: 192.168.100.31; Subnet Mask: 255.255.255.240; Default Gateway: 192.168.100.18

41. What is the Cisco IOS? ==>system software for Cisco devices Read Only Memory in Cisco devices non-volatile storage for device configurations an initial operating system that is used for boot functions

42. Which router configuration mode will require user authentication if an administrator issues the enable secret command? user executive mode ==>privileged executive mode global configuration mode service specific configuration mode

43. Which command or commands will require authentication to access the privileged exec mode? RTRA(config)# enable secret cisco RTRA(config)# service password encryption RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco ==>RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco

44. A routing issue has occurred in your internetwork. Which of the following type of devices should be examined to isolate this error? access point host hub ==>router switch

45. Which statement is true about Layer 3 addresses? They are physical addresses. ==>They are used in routing decisions. They are only used on local networks. They are altered each time a packet crosses a router.

46. Refer to the exhibit. An administrator on PC1 wants to view some HTML code from a web page housed on the web server. Which client application will allow this request to be started?

47. Which OSI layer does IP rely on to determine whether packets have been lost and to request retransmission? application presentation

session ==>transport

48. Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this? ==>10.0.0.254 192.168.0.249 192.168.0.250 10.0.1.254

49. An administrator is in the middle of entering a lengthy command when suddenly output from the IOS appears stating that an interface has gone down and then up again. Consequently, the command that the administrator was typing is no longer legible on the terminal. What CLI keystrokes can be entered to return to the line that the administrator was typing? Ctrl-D Ctrl-K Ctrl-R ==>Ctrl-Z

50. Which option represents a point-to-point logical topology diagram?

51. Which physical component is used to access and perform the initial configuration on a new unconfigured router?

52. Which option shows how a router will route packets to a remote network? Incoming search terms: which three addresses are private ip addresses (choose three )
Rackmount your Cisco Rack mount kits for your ASA5505 and your Air WLC -2100 series www.rack m ount.it/cisrack Free IPv6 Certification Get started in minutes! Become an IPv6 Guru ipv6.he .ne t Cisco Memory For Sale Find New & Refurb C isco Memory Free Shipping & Tech Support! www.Me m oryDe ale rs.com /Me m ory

85 Answers
1. 5 on Mar 05, 2012 Reply
Ads by Google Cisco CCNA Exam Cisco CCNA Cisco Systems CCNA CCNA Exam

Refer to the exhibit. PC1 is unable to access PC2. To troubleshoot this problem, the technician needs to confirm that the next hop interface is operational. Which default gateway address should the technician ping from PC1 to confirm this? 10.0.0.254 192.168.0.249 192.168.0.250 10.0.1.254 Could you review this question Im not sure its correct I think the answer is the last option. Please reply urgently
FirePlotter A real-time bandwidth monitor for C isco and FortiNet firewalls www.fire plotte r.com Free IPv6 Certification Get started in minutes! Become an IPv6 Guru ipv6.he .ne t Cisco Memory For Sale Find New & Refurb C isco Memory Free Shipping & Tech Support! www.Me m oryDe ale rs.com /Me m ory

0 Votes

0 Votes

0 Votes

2. 3 on Mar 05, 2012 Reply


Ads by Google Cisco CCNA Exam Cisco CCNA Cisco Systems CCNA CCNA Exam

the 1st option is the ip add that is being assigned to the Fa0/0 of the router

0 Votes

0 Votes

0 Votes

3. 1 on Mar 05, 2012 Reply

10.0.0.254 is right .. basic concept .. any pc with switch or not attach with router by interface . this interface is the gatway for pc ( users )

0 Votes

0 Votes

0 Votes

4. 5 on Mar 05, 2012 Reply

The question is asking the default gateway of PC1, of course its 10.0.0.254. 10.0.1.254 is PC2s default gateway

0 Votes

0 Votes

0 Votes

5. 3 on Mar 05, 2012 Reply

i think ans will be 192.168.0.250/10.0.1.254 because,here the technician needs to confirm that the next hop interface is operational or not. 10.0.0.254 will not give u any information of next hop..

0 Votes

0 Votes

0 Votes

6. 2 on Mar 05, 2012 Reply

Answer is 10.0.0.254 because question ask ..ping from PC1 to confirm this? its from PC 1 not from PC 2 ..!!

0 Votes

0 Votes

0 Votes

7. 5 on Mar 05, 2012 Reply

I think when you are trying to troubleshoot you need to ping the closest gateway or Ip address to you and if It goes through than ping the next one over. Therefor pinging the PC 1s default gateway would seem more reasonable to me and pinging pc 2

0 Votes

0 Votes

0 Votes

8. 0 on Mar 05, 2012 Reply

The question is WHICH DEFAULT GATEWAY ADDRESS SHOULD THE TECH PING FROM PC 1 we know that 10.0.0.254 and 10.0.1.254 are both default gateways. Now in order to check that the next hop interface is operational you would have to ping address 10.0.1.254 because pinging 10.0.0.254 wouldnt really tell you anything.

0 Votes

0 Votes

0 Votes

9. 1 on Mar 05, 2012 Reply

u r right.. we need to ping router b default gateway..not A

0 Votes

0 Votes

0 Votes

10. 2 on Mar 05, 2012 Reply

192.168.0.249 is the correct answer. Theyre asking about PROPER INTERFACE ON DEFAULT ROUTER -> ping to the interface of PC1`s default router.

0 Votes

0 Votes

0 Votes

11. 5 on Mar 05, 2012 Reply

Nooo, it is not asking what interface to ping its asking what to do to find out if the interface is still operational. The question is which default gateway address is to ping. Pls dont confuse ppl here The next hop (A ROUTER) in case for PC1 will be 10.0.1.254

0 Votes

0 Votes

0 Votes

12. 4 on Mar 05, 2012 Reply

I think the problem could be anywhere between PC1 and PC2.First step is to ping PC1 default gateway which is 10.0.0.254 if this ping is successful than I can ping next default gateway 10.0.1.254. If ping 10.0.1.254 first and its not successful doesnt mean ping to 10.0.0.254 will be successful.So I believe the answer is 10.0.0.254

0 Votes

0 Votes

0 Votes

13. 5 on Mar 05, 2012 Reply

MY TWO CENTS WORTH.. Q.3 Refer to the exhibit. The network administrator remotely accesses the CLI of RouterB from PC1 using a secure connection. Which statement is true about this connection? The SSH service is used to connect PC1 to RouterB. Question askes for a SECURE connection, telnet is not secure. Q.4 Refer to the exhibit. What three statements are true about the IP configuration that is shown? (Choose three.) The network on which this computer resides can have 30 hosts. The computer is unable to communicate outside of the local network.The gateway address is on a different subnet, this has a 224 mask networks hop in 32 The address that is assigned to the computer represents private addressing Q.8 Which three addresses are private IP addresses? (Choose three.) 10.0.0.1 172.31.31.10.Read question Properly..Choose 3 192.168.8.8 Q.9 The subnet mask on host C is improperly configured. Notice it has a /27, it should be /28. A and B are on the 172.16.31.96 172.16.31.111, C is on 172.16.31.80 172.16.31.95. Q.28 Which table accurately associates the RFC 1918 private IP addresses with the correct network mask? 192.168.0.0 255.255.0.0 /16 172.16.0.0 255.240.0.0 /12 10.0.0.0 255.0.0.0 /8 Q.37 Which process provides the means to send and receive data when running multiple applications at the same time on a computer? Segmentation Q.49 Ctrl-R Redisplays a line

0 Votes

0 Votes

0 Votes

14. 4 on Mar 05, 2012 Reply

u r awsm man . every correction is correct

0 Votes

0 Votes

0 Votes

15. 5 on Mar 05, 2012 Reply

Q.28 was answered correct on this site! address space 192.168.0.0 contains 256 subnets -> so you need the /24 subnetmask

0 Votes

0 Votes

0 Votes

16. 0 on Mar 05, 2012 Reply

No, youre talking about Class C networks. Its not the same to private IP adresses. The private address blocks are: 10.0.0.0 to 10.255.255.255 (10.0.0.0 /8) 172.16.0.0 to 172.31.255.255 (172.16.0.0 /12)

192.168.0.0 to 192.168.255.255 (192.168.0.0 /16)

0 Votes

0 Votes

0 Votes

17. 3 on Mar 05, 2012 Reply

UmQuestion 37 is not segmentation. The answer is sequencing.

0 Votes

0 Votes

0 Votes

18. 2 on Mar 05, 2012 Reply

43. Which command or commands will require authentication to access the privileged exec mode? RTRA(config)# enable secret cisco RTRA(config)# service password encryption RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco Could you review this question Im not sure its correct I think the answer is the first option. Please reply urgently

0 Votes

0 Votes

0 Votes

19. 4 on Mar 05, 2012 Reply

authentication so this will be in sesion like line vty RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco is right

0 Votes

0 Votes

0 Votes

20. 2 on Mar 05, 2012 Reply

The answer should be: RTRA(config)# enable secret cisco RTRA(config)# service password encryption since the question is asking about privileged exec mode not telnet session.

0 Votes

0 Votes

0 Votes

21. 0 on Mar 05, 2012 Reply

I think so too. enable secret is for privilege-exec authentication

0 Votes

0 Votes

0 Votes

22. 3 on Mar 05, 2012 Reply

But service password encryption will not help you at all to authenticate. It will just encrypt passwords at show running config

0 Votes

0 Votes

0 Votes

23. 4 on Mar 05, 2012 Reply

Enable secret will only encrypt the password but does not require login. That what the login command is for. RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco This is the correct answer and you can reverse the commands to make more sense when setting up the router. RTRA(config)# line vty 0 4 RTRA(config-line)# password cisco RTRA(config-line)# login Doing it that way actually makes more sense.

0 Votes

0 Votes

0 Votes

24. 4 on Mar 05, 2012 Reply

RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco This command is used to make an authentication when the users try to access an device by telnet. So, the correct answer is RTRA(config)# enable secret cisco Since this command is already encrypted, then need no any other command to make so. This command : RTRA(config)# service password encryption is used to encrypt the password that you put on an authentication of both line console and vty.

0 Votes

0 Votes

0 Votes

25. 5 on Mar 05, 2012 Reply

Ofcourse the first answer is correct. They ask about privilege exec mode, and enable secret password doing it. Try in PT on any device: enable conf t enable secret cisco exit exit and then try to login in to privilege exec mode. The system asku you about the password(cisco). service password encryption is not required and this command dont have influence on seting password for privileged exec mode.

0 Votes

0 Votes

0 Votes

26. 5 on Mar 05, 2012 Reply

yeahthats the correct answer.

0 Votes

0 Votes

0 Votes

27. 0 on Mar 05, 2012 Reply

Remember is questions like this that get a lot of people. The question is about Authentication to access PRIVILEGED EXEC MODE they are not asking you about loging into the router which would require a login command. enable secret cisco and service password encryption would make the router ask you for a password to access privileged mode. Which makes the first option right.

0 Votes

0 Votes

0 Votes

28. 3 on Mar 05, 2012 Reply

its easy brova RTRA= user exec mode RTRA# =user priviledge mode RTRA(config)# global config mode kk.reach me anytime

0 Votes

0 Votes

0 Votes

29. 2 on Mar 05, 2012 Reply

9. Refer to the exhibit. Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? Hosts A and B are not on the same subnet as host C. The IP addresses on the router serial interfaces are wrong. The subnet mask on host C is improperly configured. The FastEthernet interface fa0/0 of router 1 is wrongly configured. Could you review this question Im not sure its correct I think the answer is the last option. Please reply urgently

0 Votes

0 Votes

0 Votes

30. 4 on Mar 05, 2012 Reply

Q9 The subnet mask on host C is improperly configured. is the right answer

0 Votes

0 Votes

0 Votes

31. 0 on Mar 05, 2012 Reply

Answer C is maybe expected, but it is not the right one!! The question is: Host C is able to ping 127.0.0.1 successfully, but is unable to communicate with hosts A and B in the organization. What is the likely cause of the problem? and it is not because of improper subnet mask. Even with the wrong mask you will be able to ping host A from host C!! So IMHO, none of the answers are right!!!

0 Votes

0 Votes

0 Votes

32. 5 on Mar 05, 2012 Reply

Yes, I have tried it in packet tracer and the problem does not exist. You can ping hosts A and B regardless of subnet mask on host C. So the question is stupid !!

0 Votes

0 Votes

0 Votes

33. 4 on Mar 05, 2012 Reply

No, packet tracer is stupid (only emulator). Try connecting PC to a router with different subnet mask than the router interface has even arp requests are not possible as the broadcast address is different. The router will simply not listen

to hosts broadcasts.

0 Votes

0 Votes

0 Votes

34. 0 on Mar 05, 2012 Reply

The only reason why you can ping its because your in the same subnet (and for some reason packet tracer doesnt care) now router 2 and host C are not even in the same subnet.

0 Votes

0 Votes

0 Votes

35. 5 on Mar 05, 2012 Reply

No it isnt were pinging to default gateway (its a next hop) from PC1 and thats 10.0.0.254.

0 Votes

0 Votes

0 Votes

36. 4 on Mar 05, 2012 Reply

i agree! 10.0.0.254 is the next hop.

0 Votes

0 Votes

0 Votes

37. 3 on Mar 05, 2012 Reply

Q3 The connection is made through a VTY session on the router. about ssh secure the content vty secure username and password ( connection )

0 Votes

0 Votes

0 Votes

38. 4 on Mar 05, 2012 Reply

IF WE READ THIS Choosing a SSH Client SSH (or Secure Shell) is a protocol that can be used to log into a remote machine (your Virtual Server) and provide secure encrypted communications between your Virtual Server and your local computer. All of the commands you would use in a Telnet client, you can use in an SSH client. The only difference is that the communication is made via encrypted channels to and from your Virtual Server. i think the answer is The SSH service is used to connect PC1 to RouterB.

0 Votes

0 Votes

0 Votes

39. 0 on Mar 05, 2012 Reply

What about Q2.? Is the answer Neighboring routers are polled to find the best path. right?

0 Votes

0 Votes

0 Votes

40. 1 on Mar 05, 2012 Reply

Q2 I think the right answer is The packet will be discarded and The packet will be forwarded to a default route if one is present

0 Votes

0 Votes

0 Votes

41. 4 on Mar 05, 2012 Reply

yes,Im with you (tyny). I think that they are the two right answers.

0 Votes

0 Votes

0 Votes

42. 4 on Mar 05, 2012 Reply

yes,Im with you (Amir). I think that they are the two right answers.

0 Votes

0 Votes

0 Votes

43. 4 on Mar 05, 2012 Reply

yes i thought that too

0 Votes

0 Votes

0 Votes

44. 4 on Mar 05, 2012 Reply

Q43 answer is RTRA(config)# enable secret cisco RTRA(config)# service password encryption Q9 answer is The subnet mask on host C is improperly configured must be /28 like router2 fa 0/0

0 Votes

0 Votes

0 Votes

45. 4 on Mar 05, 2012 Reply

hey guys in Q3 The network administrator remotely accesses the CLI of RouterB from PC1 using a SECURE connection we all know that telnet is not secure, is that answer right ? should it not be d. *The SSH service is used to connect PC1 to RouterB.

0 Votes

0 Votes

0 Votes

46. 2 on Mar 05, 2012 Reply

Yes, SSH is the correct answer. Telnet is not secure and therefore the wrong answer.

0 Votes

0 Votes

0 Votes

47. 4 on Mar 05, 2012 Reply

8. Which three addresses are private IP addresses? (Choose three.) 172.31.31.10 is missing.

0 Votes

0 Votes

0 Votes

48. 0 on Mar 05, 2012 Reply

Can I know how to determine it is a private IP or public IP?

0 Votes

0 Votes

0 Votes

49. 3 on Mar 05, 2012 Reply

google: RFC 1918

0 Votes

0 Votes

0 Votes

50. 0 on Mar 05, 2012 Reply

banner motd messages, im sure that is the wrong answer, should it not be to prevent un authorised access and assist in legal prosecution

0 Votes

0 Votes

0 Votes

51. 4 on Mar 05, 2012 Reply

A banner doesnt prevent anything, it merely provides some text. As such you can use it only for a warning or to let users know something. It cant actually do anything practical, like preventing access.

0 Votes

0 Votes

0 Votes

52. 4 on Mar 05, 2012 Reply

I agree, a lot of people seem to be saying its to prevent unauthorized access, but it merely provides a text welcome or legal message. If you want to prevent access, then a password is implemented. Get your facts straight before confusing others.

0 Votes

0 Votes

0 Votes

53. 2 on Mar 05, 2012 Reply

about Q24 i think the answer will be; 1-to prevent unauthorized access to router 2-to provide a welcome message to users who access the router is that answer true or ..?

0 Votes

0 Votes

0 Votes

54. 0 on Mar 05, 2012 Reply

So, you think when putting a banner in your router it will prevent me from accessing your router? Lets do this in a hacker perspective

0 Votes

0 Votes

0 Votes

55. 0 on Mar 05, 2012 Reply

Configuring an appropriate banner is part of a good security plan. At a very minimum, a banner should warn against unauthorized access. Never configure a banner that welcomes an unauthorized user. from he ccna

0 Votes

0 Votes

0 Votes

56. 3 on Mar 05, 2012 Reply

Q4. Im sure that answer: The IP address that is assigned as the default gateway is valid for this host is incorrect. The computer never reaches his default gateway, why? Because when computer do operation AND on 192.168.34.1(PCs default gateway) and his subnet mask, computer will be think that this IP is from other subnet. When frame is adressed to PC which is from the same subnet(f.e: 192.168.34.48), source computer send packed to the switch, and then to the destination PC, so the correct answer is: The computer is unable to communicate outside of the local network.

0 Votes

0 Votes

0 Votes

57. 4 on Mar 05, 2012 Reply

Q19. I think the correct answer is A: R1#copry running-config tftp Name of configuration file to write [R1-run]? R1-config Write file R1-config to 192.168.3.2? [confirm] In question we see: the technican save the configuration R1, then he has made several changes, so the wrong configuration is in running-config.

0 Votes

0 Votes

0 Votes

58. 1 on Mar 05, 2012 Reply

So why would you want to make a backup copy of the running config if its wrong? Re-read this A network technician has made several changes to R1 since the configuration has last been saved. The modified configuration did not produce the desired changes. So the runing config is not good and wants to go back to the start up config and wants to as a backup before reloading.

0 Votes

0 Votes

0 Votes

59. 3 on Mar 05, 2012 Reply

Refer to question 40 Could you review this question Im not sure its correct I think the answer is IP address: 192.168.100.21; Subnet Mask: 255.255.255.248; Default Gateway: 192.168.100.18 the next hop is 192.168.100.18 thanks Revital

0 Votes

0 Votes

0 Votes

60. 4 on Mar 05, 2012 Reply

192.168.100.18 is not the next hop, it is a switch. 192.168.100.17 is a router and is the next hop outside of the broadcast domain.

0 Votes

0 Votes

0 Votes

61. 3 on Mar 05, 2012 Reply

This is correct The switch is no bearing and it cant be assigned as Default Gateway.

0 Votes

0 Votes

0 Votes

62. 3 on Mar 05, 2012 Reply

24. What are two purposes for configuring a banner on a router? (Choose two.) to announce system downtime to prevent unauthorized access to the router

to provide a description of interface connections to assist in legal prosecution for unauthorized access to provide a welcome message to users who access the router correct answers would : to prevent unauthorized access to the router to assist in legal prosecution for unauthorized access

0 Votes

0 Votes

0 Votes

63. 4 on Mar 05, 2012 Reply

man i think it s because of the routing table

0 Votes

0 Votes

0 Votes

64. 0 on Mar 05, 2012 Reply

hey guys, im planning on taking the test next month, are these the answers to most of the CCNA test questions? is this enough to take the test?

0 Votes

0 Votes

0 Votes

65. 5 on Mar 05, 2012 Reply

No it isnt. There is a pool of mor than 500 questions, where you will get about 50 to your exam. Some of my classmates took the exam last week, and they said that there were only about 10 questions they have found in the internet. The other 40 must be solved by yoursefl, and 10 correct answers isnt enough to pass the exam

0 Votes

0 Votes

0 Votes

66. 5 on Mar 05, 2012 Reply

I have taken final exam two day ago, i advice u to study these qeustions (WITH THE CORRECTIONS OF THE USERES REPLIED), And study the Version of 2010 of these answers.. plus so much little information of the chapters, i had 75% in my exam.. Good Luck

0 Votes

0 Votes

0 Votes

67. 3 on Mar 05, 2012 Reply

At q28 the answer is C : subnet masks are /16 /12 /8

0 Votes

0 Votes

0 Votes

68. 5 on Mar 05, 2012 Reply

Q49 the answer is CTRL-R [c]

0 Votes

0 Votes

0 Votes

69. 3 on Mar 05, 2012 Reply

28. Which table accurately associates the RFC 1918 private IP addresses with the correct network mask? right answer is: 192.168.0.0 255.240.0.0 172.16.0.0 255.255.0.0 10.0.0.0 255.0.0.0

0 Votes

0 Votes

0 Votes

70. 5 on Mar 05, 2012 Reply

The correct answer is 10.0.0.0 255.0.0.0 /8 172.16.0.0 255.240.0.0 /12 192.168.0.0 255.255.0.0 /16 see chapter 6 6.2.5.1

0 Votes

0 Votes

0 Votes

71. 1 on Mar 05, 2012 Reply

43. Which command or commands will require authentication to access the privileged exec mode? correct answer (also will encrypt password) RTRA(config)# enable secret cisco RTRA(config)# service password encryption This is for console password RTRA(config)# line con 0 RTRA(config-line)# login RTRA(config-line)# password cisco This is for TELNET password RTRA(config)# line vty 0 4 RTRA(config-line)# login RTRA(config-line)# password cisco

0 Votes

0 Votes

0 Votes

72. 2 on Mar 05, 2012 Reply

Can somebody explain me this question? 38. Which three IPv4 addresses represent valid host addresses for a subnet? (Choose three.) 10.1.12.79/28 10.1.12.113/28 10.1.12.32/28

10.1.11.5/27 10.1.11.97/27 10.1.11.128/27

0 Votes

0 Votes

0 Votes

73. 0 on Mar 05, 2012 Reply

hey its alright here is what i have for u Ans=10.1.12.32/28 10.1.11.97/27 1.e 32 +64=96 so u can use it as subnetting VLSM 10.1.11.128/27 kk

0 Votes

0 Votes

0 Votes

74. 2 on Mar 05, 2012 Reply

10.1.12.79/28 broadcast address for 64-79 network 10.1.12.113/28 valid 10.1.12.32/28 network address for 32-47 network 10.1.11.5/27 valid 10.1.11.97/27 valid

10.1.11.128/27 network address for 128- 159 network.

0 Votes

0 Votes

0 Votes

75. 0 on Mar 05, 2012 Reply

Q28 read from the following website on page 3. Case closed http://tools.ietf.org/html/rfc1918

0 Votes

0 Votes

0 Votes

76. 0 on Mar 05, 2012 Reply

is this web site for CCNA 640-802 ?

0 Votes

0 Votes

0 Votes

77. 0 on Mar 05, 2012 Reply

on q8, which one is the other private address?

0 Votes

0 Votes

0 Votes

78. 5 on Mar 05, 2012 Reply

172.31.31.10 RFC 1918 172.16.0.0 172.31.255.255

0 Votes

0 Votes

0 Votes

79. 2 on Mar 05, 2012 Reply

176.16.0.0 255.255.240.0 to be more precise (240=block of 16 ending 31) RFC 1918 private address 176.16.0.0 176.31.255.255

0 Votes

0 Votes

0 Votes

80. 3 on Mar 05, 2012 Reply

q.5 gateway doesnt belong to right subnet.

0 Votes

0 Votes

0 Votes

81. 3 on Mar 05, 2012 Reply

Q48: we need to confirm that the next hop interface is operational or not? we must ping the remote default gateway address. the technician must ping from PC1 to confirm this is 10.0.1.254. because if we ping the near default gateway 10.0.0.254, we do not learn the state of the connection between the routers

0 Votes

0 Votes

0 Votes

82. 0 on Mar 05, 2012 Reply

# 18 is wrong Refer to the exhibit. Host A and B are unable to communicate with each other. What is the reason for this? it asked for whats the reason for this problem and gateway address is always the network address. Answer is #3 Host A and host B belong to different networks.

0 Votes

0 Votes

0 Votes

83. 0 on Mar 05, 2012 Reply

So what A and B belong to different networks? They are connected by Router. Correct answer is still: -> #The gateway addresses are network addresses.

0 Votes

0 Votes

0 Votes

84. terry looking on May 09, 2012 Reply

where can I get a copy of this that has the exhibits/diagrams?

0 Votes

0 Votes

0 Votes

85. terry looking on May 09, 2012 Reply

Where can I get a copy of this test that actually has the exhibits and diagrams on it? This one on this site does not show any diagrams so the questions and answers make no sense.

0 Votes

0 Votes

0 Votes

Answer Question

I'm Email *

Existing User

New User? Register Now Password *

Ask a Question
Recommend this on Google

Latest Questions
Python progression path From apprentice to guru Understanding Python decorators What is a metaclass in Python? The Python yield keyword explained Why is one loop so much slower than two loops?

Tag Clouds

.net ajax algorithm android arrays asp.net asp.net-mvc asp.net-mvc-3 c# css database django eclipse facebook html html5 image ios iphone java javascript jquery linux multithreading mysql objective-c oracle performance php python ruby ruby-on-rails ruby-on-rails-3 sql sql-server string vb.net visual-studio visual-studio-2010 web-development
windows winforms wpf xcode xml

Latest Posts
Python progression path From apprentice to guru Understanding Python decorators What is a metaclass in Python? The Python yield keyword explained Why is one loop so much slower than two loops? Cycles in family tree software The Definitive C++ Book Guide and List What is the name of this operator: >? How do I calculate someone's age in C#? Visual Studio optimizations

Recent Answers

arora on Python progression path From apprentice to guru johan-offer on Python progression path From apprentice to guru arora on Python progression path From apprentice to guru xequnsruuh on Python progression path From apprentice to guru xequnsruuh on Python progression path From apprentice to guru harry on Python progression path From apprentice to guru scott on Python progression path From apprentice to guru rajesh on Python progression path From apprentice to guru arora on Python progression path From apprentice to guru harry on Python progression path From apprentice to guru

Recent Searchs
Erouting: ccna2 v4 0 chapter11 mvc3 checkboxfor (#210) Subject must be a page c# facebook login webrequest the application wrapper must end in app prepareforsegue not called estimated app store size availability h not found UnmarshalStructInfoFrom zfdatagrid form reference many to many

2012 Question and answer All right reserved. Answers Theme by Tips4All

Вам также может понравиться