Can You Pass This CCIE Routing And Switching Exam?

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tarun
T
Tarun
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,504
Questions: 36 | Attempts: 1,504

SettingsSettingsSettings
Can You Pass This CCIE Routing And Switching Exam? - Quiz

The Cisco Certified Internetwork Expert (CCIE) is an internationally recognized certification test which is conducted for IT Networking Professionals. The expert level can only be achieved by technically proficient and experienced IT professionals. This trivia quiz has been developed to test your knowledge about the operations of networks, engineering and networking. Read the questions carefully and answer. So, let's try out the quiz. All the best!


Questions and Answers
  • 1. 

    What is the adminitrative distance of EBGP route?

    • A.

      100

    • B.

      200

    • C.

      20

    • D.

      170

    • E.

      200

    Correct Answer
    C. 20
    Explanation
    The administrative distance of a route is a measure of its trustworthiness or reliability. A lower administrative distance indicates a more preferred route. In this case, the correct answer is 20, which means that EBGP (External Border Gateway Protocol) routes have an administrative distance of 20. This suggests that EBGP routes are considered very reliable and trustworthy, making them a preferred choice for routing decisions.

    Rate this question:

  • 2. 

    What methods can be used to overcome IBGP full mesh requirement?(Choose Two)

    • A.

      Route Reflector

    • B.

      Conferedation

    • C.

      Hub and spoke

    • D.

      Partial mesh

    • E.

      Point to point

    Correct Answer(s)
    A. Route Reflector
    B. Conferedation
    Explanation
    Route reflectors and confederations are two methods that can be used to overcome the IBGP full mesh requirement.

    1. Route reflectors: In a full mesh IBGP network, every router needs to establish a direct BGP session with every other router. This can become impractical and difficult to manage in large networks. Route reflectors address this issue by allowing routers to establish a BGP session with a selected set of route reflectors instead of every router in the network. The route reflectors then reflect the BGP updates to other routers, reducing the number of required BGP sessions.

    2. Confederations: Similar to route reflectors, confederations also aim to reduce the number of required BGP sessions in large networks. In a confederation, the network is divided into smaller sub-autonomous systems, and each sub-autonomous system has its own internal BGP (IBGP) mesh. The sub-autonomous systems then establish external BGP (EBGP) sessions with routers in other sub-autonomous systems, reducing the overall number of required IBGP sessions.

    Rate this question:

  • 3. 

    When redistributing rip into OSPF what routes get redistributed into OSPF(choose all that apply)

    • A.

      Rip routes

    • B.

      Directly connected interfaces running rip

    • C.

      Static routes

    • D.

      Floating routes

    • E.

      Null routes

    Correct Answer(s)
    A. Rip routes
    B. Directly connected interfaces running rip
    Explanation
    When redistributing RIP into OSPF, the routes that get redistributed into OSPF are RIP routes and directly connected interfaces running RIP. RIP routes are the routes learned through the RIP routing protocol, while directly connected interfaces running RIP are the interfaces that are directly connected to the router and are running the RIP protocol. The other options, static routes, floating routes, and null routes, are not included in the redistribution process.

    Rate this question:

  • 4. 

    What type of LSA's are blocked in the totally stubby area? (choose all that apply)

    • A.

      LSA1

    • B.

      LSA2

    • C.

      LSA3

    • D.

      LSA4

    • E.

      LSA5

    Correct Answer(s)
    C. LSA3
    E. LSA5
    Explanation
    In a totally stubby area, only LSA1 and LSA2 are allowed to propagate, while LSA3, LSA4, and LSA5 are blocked. LSA3 is a summary LSA generated by an ABR to advertise routes from outside the autonomous system (AS). LSA5 is an external LSA generated by an ASBR to advertise routes from other AS. Since a totally stubby area is designed to reduce the size of the routing table and limit external routes, LSA3 and LSA5 are blocked to prevent unnecessary routing information from entering the area.

    Rate this question:

  • 5. 

    How can summarization be done in OSPF? (choose all that apply)

    • A.

      Area range

    • B.

      Virtual link

    • C.

      Summary address

    • D.

      Stub

    • E.

      Nssa

    Correct Answer(s)
    A. Area range
    C. Summary address
    Explanation
    Summarization in OSPF can be achieved through the use of "area range" and "summary address". The "area range" command allows the aggregation of multiple subnets into a single summary route within an OSPF area. This helps in reducing the size of the routing table and improving network efficiency. Similarly, the "summary address" command can be used to summarize routes at the boundary between OSPF areas, allowing for efficient routing and reducing the number of entries in the routing table.

    Rate this question:

  • 6. 

    In frame relay what OSPF network type requires a neighbor statement?(choose all that apply)

    • A.

      Point-to-multipoint

    • B.

      Point-to-point

    • C.

      Broadcast

    • D.

      Non-broadcast

    • E.

      Physcial

    Correct Answer(s)
    C. Broadcast
    D. Non-broadcast
    Explanation
    The OSPF network types that require a neighbor statement in frame relay are broadcast and non-broadcast. In a broadcast network, OSPF routers can dynamically discover their neighbors without explicitly configuring them. However, in a non-broadcast network, such as frame relay, OSPF routers cannot automatically discover their neighbors. Therefore, a neighbor statement must be configured to establish adjacency between OSPF routers in both broadcast and non-broadcast networks.

    Rate this question:

  • 7. 

    MQC is a combination of which queuing mechanisms?(choose 2)

    • A.

      CBWFQ

    • B.

      PQ

    • C.

      Custome Queue

    • D.

      FIFO

    • E.

      In/out

    Correct Answer(s)
    A. CBWFQ
    B. PQ
    Explanation
    MQC (Modular QoS CLI) is a feature in Cisco IOS that allows for the configuration of quality of service (QoS) parameters on a network device. CBWFQ (Class-Based Weighted Fair Queuing) and PQ (Priority Queuing) are both queuing mechanisms that can be used with MQC. CBWFQ allows for the allocation of bandwidth to different traffic classes based on defined policies, while PQ gives priority to certain traffic classes over others. Therefore, CBWFQ and PQ are the two queuing mechanisms that can be combined with MQC. The other options, Custom Queue, FIFO, and In/out, are not specific queuing mechanisms and are not compatible with MQC.

    Rate this question:

  • 8. 

    In MCQ how much bandwidth % can you reserve on an interface?

    • A.

      74

    • B.

      70

    • C.

      75

    • D.

      50

    • E.

      80

    Correct Answer
    C. 75
    Explanation
    The correct answer is 75. In networking, bandwidth refers to the amount of data that can be transmitted over a network connection in a given time. Reserving bandwidth on an interface allows for prioritization of certain types of traffic, ensuring that they have sufficient bandwidth to function properly. In this case, the correct answer suggests that you can reserve up to 75% of the available bandwidth on an interface.

    Rate this question:

  • 9. 

    EIGRP Query can be stopped from propagating using?(choose 2)

    • A.

      Stub area

    • B.

      Different domain

    • C.

      Summarization

    • D.

      Passive interface

    • E.

      Shutdown

    Correct Answer(s)
    A. Stub area
    C. Summarization
    Explanation
    EIGRP queries can be stopped from propagating using two methods: stub area and summarization. In a stub area, routers do not advertise external routes, which prevents EIGRP queries from being sent outside the area. Summarization involves aggregating multiple routes into a single route, reducing the number of queries that need to be sent. Passive interface, shutdown, and different domain are not valid methods for stopping EIGRP queries from propagating.

    Rate this question:

  • 10. 

    Which protocols have a default metric of infinity when other protocols are redistributed into them? (choose 2)

    • A.

      IS-IS

    • B.

      BGP

    • C.

      RIP

    • D.

      OSPF

    • E.

      EIGRP

    Correct Answer(s)
    C. RIP
    E. EIGRP
    Explanation
    RIP and EIGRP have a default metric of infinity when other protocols are redistributed into them. RIP (Routing Information Protocol) uses a hop count as its metric, and a hop count of 16 is considered infinity. EIGRP (Enhanced Interior Gateway Routing Protocol) uses a metric called "feasible distance," and a feasible distance of 4294967295 is considered infinity. Therefore, when other protocols are redistributed into RIP or EIGRP, their metrics are set to infinity.

    Rate this question:

  • 11. 

    What are RFC 1918 addresses?

    • A.

      Private address space

    • B.

      Public address space

    • C.

      VPN addresses

    • D.

      Null addresses

    • E.

      Loopback addresses

    Correct Answer
    A. Private address space
    Explanation
    RFC 1918 addresses refer to a range of IP addresses that are reserved for private use within a network. These addresses are not routable on the internet and are commonly used for internal networks, such as those found in homes, offices, or organizations. They are designed to provide a limited number of unique IP addresses that can be used within a private network without conflicting with public IP addresses. This helps to ensure the security and integrity of private networks by keeping them separate from the public internet.

    Rate this question:

  • 12. 

    What command must be typed in OSPF to make a loopback appear with its correct mask?

    • A.

      Ip ospf network point-to-point

    • B.

      Broadast

    • C.

      Non broadcast

    • D.

      Cost 0

    • E.

      Cost 100

    Correct Answer
    A. Ip ospf network point-to-point
    Explanation
    The correct answer is "ip ospf network point-to-point". This command must be typed in OSPF to make a loopback appear with its correct mask. This command configures the OSPF network type as point-to-point, which is necessary for loopback interfaces to function properly in OSPF.

    Rate this question:

  • 13. 

    In BGP when filtering inbound What is the order of filtering?

    • A.

      Route-map, filter-list,distribute-list

    • B.

      Distribute-list,filter-list,route-map

    • C.

      Route-map,distribute-list

    • D.

      Filter-list,route-map

    • E.

      Access-list,distribute-list

    Correct Answer
    A. Route-map, filter-list,distribute-list
    Explanation
    The correct order of filtering in BGP when filtering inbound is route-map, filter-list, distribute-list. This means that the route-map is applied first to filter the incoming routes, followed by the filter-list and then the distribute-list.

    Rate this question:

  • 14. 

    What does regular expression _40_ in BGP AS-path access-list mean?

    • A.

      Passing through AS 40

    • B.

      Startng from AS 40

    • C.

      Ending from AS 40

    • D.

      Originating from AS 40

    • E.

      Terminating at AS 40

    Correct Answer
    A. Passing through AS 40
    Explanation
    The regular expression _40_ in BGP AS-path access-list means that the route is passing through AS 40. This means that the AS-path of the route contains AS 40 as one of the intermediate ASes that the route traverses.

    Rate this question:

  • 15. 

    (*.G) is the characteristic of which Mutlticast Mode?

    • A.

      Dense

    • B.

      MSDP

    • C.

      Bi-directional

    • D.

      Sparse

    • E.

      Dvmrp

    Correct Answer
    D. Sparse
    Explanation
    The correct answer is sparse. Sparse mode is a multicast mode that is used when there are only a few receivers interested in receiving the multicast traffic. In this mode, multicast routers do not forward multicast traffic unless explicitly requested by a receiver. This helps to conserve network bandwidth by only sending traffic to those receivers that have explicitly requested it.

    Rate this question:

  • 16. 

    What are the extended VLANs?

    • A.

      Vlans greater than 1005

    • B.

      Vlans with number less than 1000

    • C.

      Vlan 1

    • D.

      Van 2

    • E.

      Vlan 4095

    Correct Answer
    A. Vlans greater than 1005
    Explanation
    Extended VLANs refer to VLANs that have a VLAN ID greater than 1005. In traditional VLAN implementations, VLAN IDs range from 1 to 1005, with VLANs 1 and 1002-1005 being reserved for specific purposes. However, in some newer implementations, VLAN IDs can exceed 1005, allowing for a larger number of VLANs to be created and used in the network.

    Rate this question:

  • 17. 

    Links with speeds lower than what value require fragmentation and interleaving?

    • A.

      512K

    • B.

      1024K

    • C.

      1.54M

    • D.

      768K

    • E.

      256K

    Correct Answer
    D. 768K
    Explanation
    Links with speeds lower than 768K require fragmentation and interleaving. This means that if the link speed is 768K or higher, fragmentation and interleaving are not necessary.

    Rate this question:

  • 18. 

    What is the significance of the same cluster-id in BGP cluster?

    • A.

      It prevents routes coming from one route reflector from entering the routing table of another RR in the same cluster

    • B.

      It prevents routes coming from one ebgp from entering the routing table of another RR in the same cluster

    • C.

      It prevents routes coming from one router from entering the routing table of another RR in the same cluster

    • D.

      It prevents routes coming from one route reflector from entering the routing table of same RR in the same cluster

    • E.

      It prevents routes coming from two route reflector from entering the routing table of another RR in the same cluster

    Correct Answer
    A. It prevents routes coming from one route reflector from entering the routing table of another RR in the same cluster
    Explanation
    The significance of having the same cluster-id in BGP cluster is that it prevents routes coming from one route reflector from entering the routing table of another route reflector in the same cluster. This helps to avoid routing loops and ensures that the routes are properly distributed within the cluster without redundancy.

    Rate this question:

  • 19. 

    In a RR senario a non client will not advertise to which bgp peer?

    • A.

      Route-reflector

    • B.

      Ebgp

    • C.

      Non-client

    • D.

      RR client

    • E.

      Ibgp

    Correct Answer
    C. Non-client
    Explanation
    In a route-reflector (RR) scenario, a non-client will not advertise to the route-reflector peer. This is because a non-client does not have the capability to reflect routes to other peers. Only RR clients, which are configured with the "route-reflector-client" command, can advertise routes to the route-reflector peer. Therefore, the non-client will not advertise to the route-reflector peer.

    Rate this question:

  • 20. 

    Which protocols are affected by the rule of split horizon? choose 2

    • A.

      Ospf

    • B.

      Bgp

    • C.

      Rip

    • D.

      Odr

    • E.

      Eigrp

    Correct Answer(s)
    C. Rip
    E. Eigrp
    Explanation
    The protocols that are affected by the rule of split horizon are RIP and EIGRP. Split horizon is a technique used in routing protocols to prevent routing loops by not advertising routes back out of the same interface they were learned from. In the case of RIP and EIGRP, both protocols implement split horizon to avoid routing loops and ensure efficient routing within a network.

    Rate this question:

  • 21. 

    How can you contain a smurf attack?

    • A.

      Nbar

    • B.

      Car

    • C.

      Shape

    • D.

      Pbr

    • E.

      Static route

    Correct Answer
    B. Car
    Explanation
    A smurf attack is a type of Distributed Denial of Service (DDoS) attack where the attacker floods a target network with a large volume of ICMP echo request packets, using spoofed IP addresses of the victim. These packets are then broadcasted to a network that amplifies the attack, overwhelming the victim's network and causing it to become inaccessible. To contain a smurf attack, implementing Car (Committed Access Rate) can be effective. Car limits the bandwidth that can be used for certain types of traffic, including ICMP, preventing the attacker from flooding the network with excessive ICMP packets and reducing the impact of the attack.

    Rate this question:

  • 22. 

    How can you contain spoofing attacks?

    • A.

      Urpf

    • B.

      Static route to null

    • C.

      Car

    • D.

      Pbr

    • E.

      Shutdown interface

    Correct Answer
    A. Urpf
    Explanation
    Urpf (Unicast Reverse Path Forwarding) is a technique used to prevent spoofing attacks. It checks the source IP address of incoming packets against the routing table to ensure that the packet is arriving on the expected interface. If the source IP address does not match the expected interface, the packet is dropped. Urpf helps in verifying the authenticity of the source IP address and prevents attackers from impersonating other systems by spoofing their IP addresses.

    Rate this question:

  • 23. 

    How does eigrp do unequal load balancing?

    • A.

      Cef

    • B.

      Ip cef

    • C.

      Using variance command

    • D.

      Static routes

    • E.

      Route to null zero

    Correct Answer
    C. Using variance command
    Explanation
    EIGRP can achieve unequal load balancing by using the variance command. This command allows the router to consider paths with a metric that is higher than the best path. By setting a variance value, EIGRP will include paths with a metric that is up to that value times higher than the best path. This enables the router to distribute traffic across multiple paths, even if their metrics are not equal. This way, EIGRP can achieve unequal load balancing and optimize network performance.

    Rate this question:

  • 24. 

    Which authentication type is supported by BGP?

    • A.

      Plain text

    • B.

      Md5

    • C.

      Des

    • D.

      Aes

    • E.

      Md5

    Correct Answer
    E. Md5
    Explanation
    BGP supports the md5 authentication type. This means that BGP routers can use the md5 algorithm to authenticate the BGP messages exchanged between them. MD5 authentication helps ensure that the BGP messages are not tampered with during transit and that they are coming from trusted sources.

    Rate this question:

  • 25. 

    What are E1 routes in OSPF?

    • A.

      More specific cost

    • B.

      Less metric

    • C.

      More metric

    • D.

      Equal metric

    • E.

      Metric

    Correct Answer
    A. More specific cost
    Explanation
    E1 routes in OSPF refer to external routes with a more specific cost. This means that these routes have a higher level of specificity compared to other routes. In OSPF, routes with higher specificity are preferred over routes with lower specificity. Therefore, when multiple routes are available, OSPF will choose the route with the more specific cost as the preferred route.

    Rate this question:

  • 26. 

    What IGMP version supports IGMP leave messages?

    • A.

      V1

    • B.

      V0

    • C.

      V2

    • D.

      V0 and V1

    • E.

      V1 and V2

    Correct Answer
    C. V2
    Explanation
    IGMP (Internet Group Management Protocol) is a communication protocol used by hosts and adjacent routers on an Internet Protocol (IP) network to establish multicast group memberships. IGMP version 2 (V2) supports IGMP leave messages. These messages are sent by a host to inform the router that it no longer wants to receive multicast traffic for a specific group. Therefore, V2 is the correct answer as it specifically supports the IGMP leave messages.

    Rate this question:

  • 27. 

    What flag does spare mode use for SPT switch over?

    • A.

      T

    • B.

      J

    • C.

      C

    • D.

      L

    • E.

      S

    Correct Answer
    A. T
    Explanation
    Spare mode uses the flag "T" for SPT switch over.

    Rate this question:

  • 28. 

    In BGP if the next hop is not reachable, what happens to the route?

    • A.

      It is not installed in the routing table and in BGP table it shows up as inaccessable

    • B.

      It is installed in the routing table and in BGP table it shows up as inaccessable

    • C.

      It installed in the routing table and in BGP table it shows up as accessable

    • D.

      It is not installed in the routing table and in BGP table it shows up as accessable

    • E.

      It is not installed in the routing table and in BGP table it shows up as accessable two times

    Correct Answer
    A. It is not installed in the routing table and in BGP table it shows up as inaccessable
    Explanation
    If the next hop is not reachable in BGP, the route is not installed in the routing table and in the BGP table it shows up as inaccessible.

    Rate this question:

  • 29. 

    What is the admin distance of external EIGRP routes?

    • A.

      1

    • B.

      2

    • C.

      5

    • D.

      90

    • E.

      170

    Correct Answer
    E. 170
    Explanation
    The admin distance of external EIGRP routes is 170. Admin distance is a measure of the trustworthiness of a routing protocol, indicating the preference of one routing source over another. In EIGRP, external routes are those learned from other routing protocols. The admin distance of 170 for external EIGRP routes means that these routes are considered less trustworthy compared to internal EIGRP routes, which have an admin distance of 90.

    Rate this question:

  • 30. 

    In BGP if the AS filter is _40_ what does it mean?

    • A.

      Ending at AS40

    • B.

      Originated from AS 40

    • C.

      Passing from AS 40

    • D.

      Termination on AS 40

    • E.

      Directly connected AS

    Correct Answer
    C. Passing from AS 40
    Explanation
    The correct answer is "Passing from AS 40." In BGP, if the AS filter is set to 40, it means that the route is being passed through AS 40. This indicates that the route is being transmitted or forwarded through AS 40 to reach its destination.

    Rate this question:

  • 31. 

    (*,G) is the characteristic of which multicast protocol?

    • A.

      Dense mode

    • B.

      Msdp

    • C.

      Mospf

    • D.

      Dvmrp

    • E.

      Sparse mode

    Correct Answer
    E. Sparse mode
    Explanation
    The characteristic of (*,G) is associated with the multicast protocol known as "sparse mode". In sparse mode, multicast traffic is only forwarded to specific groups that have requested it, rather than being flooded to all devices on the network. This helps to conserve network bandwidth and resources by only sending traffic where it is needed.

    Rate this question:

  • 32. 

    What is the port number for tftp?

    • A.

      87

    • B.

      80

    • C.

      23

    • D.

      53

    • E.

      69

    Correct Answer
    E. 69
    Explanation
    The correct answer is 69. TFTP (Trivial File Transfer Protocol) is a simple file transfer protocol that operates on UDP port 69. It is commonly used for transferring files between network devices, such as routers and switches, in a network. The other options (87, 80, 23, and 53) are incorrect port numbers and are not associated with TFTP.

    Rate this question:

  • 33. 

    What is the name given to the Firewall built into the Cisco IOS?

    • A.

      Access-list

    • B.

      Lock and key

    • C.

      CBAC

    • D.

      VPN

    • E.

      IPSEC

    Correct Answer
    C. CBAC
    Explanation
    CBAC stands for Context-Based Access Control. It is a feature built into the Cisco IOS firewall that provides advanced security capabilities. CBAC allows the firewall to inspect and control traffic based on the context of the connection, including the application layer protocols and state information. It can dynamically open and close ports, keeping track of the state of the connection, and provides protection against various network attacks. CBAC is an important component of network security in Cisco devices and helps to prevent unauthorized access and protect against potential threats.

    Rate this question:

  • 34. 

    How can you disable logging on the console of a router?

    • A.

      Logging off

    • B.

      Off

    • C.

      On on

    • D.

      No logging console

    • E.

      No console

    Correct Answer
    D. No logging console
    Explanation
    To disable logging on the console of a router, the command "no logging console" can be used. This command turns off the logging feature specifically for the console interface. By using this command, log messages will no longer be displayed on the console, providing a more streamlined and less cluttered console interface.

    Rate this question:

  • 35. 

    How are required for SSH on a router? choose 3

    • A.

      Hostname

    • B.

      Domain-name

    • C.

      Ip address

    • D.

      Access-list

    • E.

      Generate RSA Public/private Key

    Correct Answer(s)
    A. Hostname
    B. Domain-name
    E. Generate RSA Public/private Key
    Explanation
    The question is asking for three requirements for SSH on a router. The first requirement is the hostname, which is the unique name given to the router. The second requirement is the domain-name, which is the name of the domain to which the router belongs. The third requirement is to generate an RSA public/private key, which is used for secure authentication and encryption in SSH. These three requirements are necessary for enabling and configuring SSH on a router.

    Rate this question:

  • 36. 

    How can you only enable SSH connection on a Cisco Route for management?

    • A.

      No transport

    • B.

      Transport ssh

    • C.

      Transport input ssh

    • D.

      Transport output telnet

    • E.

      Ssh enable

    Correct Answer
    C. Transport input ssh
    Explanation
    The correct answer is "transport input ssh." This command allows only SSH connections for management on a Cisco router. By specifying "ssh" as the only transport input method, other methods such as telnet or HTTP are disabled, ensuring that only SSH connections are allowed for remote management of the router.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 03, 2008
    Quiz Created by
    Tarun
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.