CCNA Routing & Switching 200-125: New Questions - Part 1

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Milosavljevicvm
M
Milosavljevicvm
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,001
Questions: 50 | Attempts: 323

SettingsSettingsSettings
CCNA Routing & Switching 200-125: New Questions - Part 1 - Quiz


CCNA Routing & Switching 200-125: New Questions - Part 1 of 3.


Questions and Answers
  • 1. 

    What IP SLA ICMP Echo measures?

    • A.

      End-to-end response time

    • B.

      Packet loss

    • C.

      Congestion

    • D.

      Hop-by-hop distance

    Correct Answer
    A. End-to-end response time
    Explanation
    IP SLA ICMP Echo measures the end-to-end response time. This means it measures the time it takes for a packet to travel from the source to the destination and back again. By measuring the end-to-end response time, network administrators can assess the quality and performance of their network connections.

    Rate this question:

  • 2. 

    What are types of IPv6 static routes? (Choose three.)

    • A.

      Advertised routes

    • B.

      Recursive routes

    • C.

      Virtual links

    • D.

      Directly connected routes

    • E.

      Fully specified routes

    • F.

      Redistributed routes

    Correct Answer(s)
    B. Recursive routes
    D. Directly connected routes
    E. Fully specified routes
    Explanation
    The types of IPv6 static routes are recursive routes, directly connected routes, and fully specified routes. Recursive routes are used when the next-hop address is not known and the router needs to recursively query other routers to find the next-hop address. Directly connected routes are routes to networks that are directly connected to the router's interfaces. Fully specified routes include both the network address and the next-hop address.

    Rate this question:

  • 3. 

    What is true about DTP? (Choose three.)

    • A.

      Layer 2 protocol

    • B.

      Proprietary protocol

    • C.

      Layer 3 protocol

    • D.

      Enabled by default

    • E.

      Disabled by default

    Correct Answer(s)
    A. Layer 2 protocol
    B. Proprietary protocol
    D. Enabled by default
    Explanation
    DTP stands for Dynamic Trunking Protocol, which is a Cisco proprietary protocol used to negotiate trunking between switches. It operates at Layer 2 of the OSI model, making the first option "Layer 2 protocol" true. Additionally, DTP is a proprietary protocol developed by Cisco, making the second option "Proprietary protocol" true. Finally, DTP is enabled by default on Cisco switches, making the third option "enabled by default" true.

    Rate this question:

  • 4. 

    Which three ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.)

    • A.

      Switch A – Fa0/0

    • B.

      Switch A – Fa0/1

    • C.

      Switch B – Fa0/0

    • D.

      Switch B – Fa0/1

    • E.

      Switch C – Fa0/0

    • F.

      Switch C – Fa0/1

    Correct Answer(s)
    B. Switch A – Fa0/1
    C. Switch B – Fa0/0
    D. Switch B – Fa0/1
    Explanation
    The three ports that will be STP designated ports are Switch A - Fa0/1, Switch B - Fa0/0, and Switch B - Fa0/1. This is because in Spanning Tree Protocol (STP), designated ports are selected based on the lowest path cost. Since all the links are operating at the same bandwidth, the path cost will be the same for all the links. Therefore, the designated ports will be chosen based on the lowest interface priority. In this case, Switch A - Fa0/1 has the lowest interface priority, followed by Switch B - Fa0/0 and Switch B - Fa0/1.

    Rate this question:

  • 5. 

    How is MPLS implemented?

    • A.

      It can be implemented on LAN

    • B.

      It can be implemented on redundant and non redundant links

    • C.

      It can be implemented on redundant links only

    • D.

      It can be implemented on WLAN

    Correct Answer
    B. It can be implemented on redundant and non redundant links
    Explanation
    MPLS (Multiprotocol Label Switching) can be implemented on both redundant and non-redundant links. This means that MPLS can be used on network connections that have backup or redundant links as well as on connections that do not have redundancy. This flexibility allows for efficient and reliable routing of data packets, ensuring optimal performance and fault tolerance in the network. MPLS is not limited to a specific type of network, such as LAN or WLAN, but can be implemented across various types of networks.

    Rate this question:

  • 6. 

    Which two statements are true about IPv6 Unique Local Addresses? (Choose two.)

    • A.

      It is the counterpart of IPv4 private addresses

    • B.

      It uses FC00::/7 as prefix

    • C.

      It is the counterpart of IPv4 public addresses

    • D.

      It uses FE80::/10 as prefix

    Correct Answer(s)
    A. It is the counterpart of IPv4 private addresses
    B. It uses FC00::/7 as prefix
    Explanation
    IPv6 Unique Local Addresses (ULA) are the counterpart of IPv4 private addresses. They are used for local communication within a specific organization or site. They are not routable on the public internet. ULA uses the FC00::/7 prefix, which means that the first 7 bits of the address are fixed. This prefix allows for a large number of unique local addresses to be generated. Therefore, the two true statements about IPv6 Unique Local Addresses are that they are the counterpart of IPv4 private addresses and they use the FC00::/7 prefix.

    Rate this question:

  • 7. 

    What’s are true about MPLS?

    • A.

      It uses IPv4 and IPv6

    • B.

      It uses MAC addresses

    • C.

      It uses a label to separate traffic from several costumers

    • D.

      It uses IPv4 only

    Correct Answer
    C. It uses a label to separate traffic from several costumers
    Explanation
    MPLS (Multiprotocol Label Switching) is a networking technology that uses a label to separate traffic from multiple customers. It does not rely on IPv4 or IPv6 addresses or MAC addresses for this purpose. Instead, MPLS adds a label to each packet, allowing routers to quickly and efficiently direct traffic based on the label. This allows for improved traffic management, quality of service, and network performance.

    Rate this question:

  • 8. 

    Which two spanning-tree port states does RSTP combine to allow faster convergence? (Choose two.)

    • A.

      Discarding

    • B.

      Forwarding

    • C.

      Listening

    • D.

      Learning

    • E.

      Blocking

    Correct Answer(s)
    C. Listening
    E. Blocking
    Explanation
    RSTP combines the listening and blocking spanning-tree port states to allow faster convergence. The listening state is a transitional state where the port receives BPDUs and prepares to move to the forwarding state. The blocking state is a state where the port does not forward any traffic but still receives BPDUs to determine the topology. By combining these two states, RSTP can quickly determine the best path and converge the network faster.

    Rate this question:

  • 9. 

    Which two protocols can detect native VLAN mismatch errors? (Choose two.)

    • A.

      CDP

    • B.

      VTP

    • C.

      DTP

    • D.

      STP

    • E.

      PAGP

    Correct Answer(s)
    A. CDP
    D. STP
    Explanation
    CDP (Cisco Discovery Protocol) is a Cisco proprietary protocol that can be used to detect native VLAN mismatch errors. It allows Cisco devices to share information about their capabilities and configurations, including VLAN information. By comparing the VLAN information exchanged through CDP, devices can identify if there is a native VLAN mismatch.

    STP (Spanning Tree Protocol) is a standardized protocol used to prevent loops in a network. It can also detect native VLAN mismatch errors by comparing the VLAN information in the BPDU (Bridge Protocol Data Unit) messages exchanged between switches. If the VLAN information in the BPDU does not match, it indicates a native VLAN mismatch.

    Rate this question:

  • 10. 

    An interface which we have to determine from the routing the route learned by which routing protocol?

    • A.

      OSPF

    • B.

      RIP

    • C.

      BGP

    • D.

      EIGRP

    Correct Answer
    D. EIGRP
    Explanation
    EIGRP (Enhanced Interior Gateway Routing Protocol) is the routing protocol that is used to determine the route learned by the interface mentioned in the question. OSPF (Open Shortest Path First), RIP (Routing Information Protocol), and BGP (Border Gateway Protocol) are also routing protocols, but the correct answer in this case is EIGRP.

    Rate this question:

  • 11. 

    How to verify strong and secure SSH connection?

    • A.

      Ssh -v 2 -l admin 10.1.1.1

    • B.

      Ssh -v 1 -l admin 10.1.1.1

    • C.

      Ssh -l admin 10.1.1.1

    • D.

      Ssh ­v 2 admin 10.1.1.1

    Correct Answer
    A. Ssh -v 2 -l admin 10.1.1.1
    Explanation
    The correct answer is "ssh -v 2 -l admin 10.1.1.1". This command uses the "-v" flag to enable verbose mode, which provides more detailed information about the SSH connection. The "2" after the "-v" flag specifies that SSH version 2 should be used, which is more secure than version 1. The "-l admin" option specifies the username "admin" to log in with, and "10.1.1.1" is the IP address of the server to connect to. This command ensures that a strong and secure SSH connection is established by using SSH version 2 and providing the necessary login credentials.

    Rate this question:

  • 12. 

    What interconnection cable can you use when you use a MDI connection?

    • A.

      Cut-through

    • B.

      Crossover

    • C.

      Straight-through

    • D.

      Rollover

    Correct Answer
    B. Crossover
    Explanation
    When using a MDI (Medium Dependent Interface) connection, a crossover cable is required. This type of cable allows for the direct connection between two similar devices, such as two computers or two switches, without the need for a hub or switch in between. The crossover cable is designed to swap the transmit and receive signals, ensuring proper communication between the devices. This is in contrast to a straight-through cable, which is used to connect different types of devices, such as a computer to a switch. A rollover cable, on the other hand, is used for connecting a computer to the console port of a network device for management purposes.

    Rate this question:

  • 13. 

    CIDR notation (255.255.255.252 ) / notation?

    • A.

      28

    • B.

      29

    • C.

      30

    • D.

      31

    Correct Answer
    C. 30
    Explanation
    The given CIDR notation (255.255.255.252) represents a subnet mask that has 30 bits set to 1. In CIDR notation, the number after the forward slash (/) indicates the number of network bits in the subnet mask. Since there are 30 network bits in this subnet mask, the correct answer is 30.

    Rate this question:

  • 14. 

    Which 2 statements about extended traceroute command is true? (Choose two.)

    • A.

      It can validate the reply data

    • B.

      It can send packets from specified interface or IP address

    • C.

      It can use a specified TTL value

    • D.

      It can use a specified TOS

    • E.

      It can repeated automatically to a specified interval

    Correct Answer(s)
    B. It can send packets from specified interface or IP address
    C. It can use a specified TTL value
    Explanation
    The extended traceroute command allows the user to send packets from a specified interface or IP address. This means that the user can choose the source of the packets, which can be useful in certain network troubleshooting scenarios. Additionally, the extended traceroute command can also use a specified TTL (Time-to-Live) value. The TTL value determines the maximum number of hops that a packet can take before being discarded, and by specifying this value, the user can control the depth of the traceroute.

    Rate this question:

  • 15. 

    What type of MAC address is aged automatically by the switch?

    • A.

      Static

    • B.

      Auto

    • C.

      Configured

    • D.

      Dynamic

    Correct Answer
    D. Dynamic
    Explanation
    Dynamic MAC addresses are automatically aged by the switch. This means that the switch will remove the dynamic MAC addresses from its MAC address table after a certain period of inactivity. Dynamic MAC addresses are learned by the switch when a device sends a frame to the network, and they are aged to ensure that the MAC address table remains up to date and does not contain unnecessary entries.

    Rate this question:

  • 16. 

    What does split-horizon do?

    • A.

      Prevents routing loop in distance vector protocols

    • B.

      Prevents switching loop in distance vector protocols

    • C.

      Prevents switching loop in link-state protocols

    • D.

      Prevents routing loop in link-state protocols

    Correct Answer
    A. Prevents routing loop in distance vector protocols
    Explanation
    Split-horizon is a technique used in distance vector protocols to prevent routing loops. In distance vector protocols, each router sends its routing table to its neighboring routers. Split-horizon prevents a router from advertising a route back to the same router it received it from. This helps to avoid the scenario where routers continuously exchange routing information in a loop, leading to inefficient routing and network congestion. By not advertising routes back to the same router, split-horizon ensures that routing loops are avoided and the network operates more efficiently.

    Rate this question:

  • 17. 

    What are the requirements for running VTP (Choose two.)

    • A.

      VTP domain names must be the same

    • B.

      VTP domain names must be different

    • C.

      VTP server must have the highest revision numbers

    • D.

      All devices need to have the same VTP version

    Correct Answer(s)
    A. VTP domain names must be the same
    D. All devices need to have the same VTP version
    Explanation
    The requirements for running VTP are that the VTP domain names must be the same and all devices need to have the same VTP version. This ensures that all devices within the VTP domain are synchronized and can exchange VLAN information effectively. Having the same domain name allows devices to recognize each other as part of the same VTP domain, while having the same VTP version ensures compatibility and consistent VLAN configuration across all devices.

    Rate this question:

  • 18. 

    If a route is not present in the routing table for a particular destination, what would the router do?

    • A.

      Default route

    • B.

      Drop

    • C.

      Flood

    • D.

      Static route

    Correct Answer
    B. Drop
    Explanation
    If a route is not present in the routing table for a particular destination, the router would drop the packet. This means that the router would discard the packet and not forward it to any other destination. Dropping the packet is the default action taken by the router when it does not have a specific route for a destination.

    Rate this question:

  • 19. 

    Which command can you enter to verify that a 128-bit address is live and responding?

    • A.

      Ping

    • B.

      Telnet

    • C.

      Ping ipv6

    • D.

      Traceroute

    Correct Answer
    C. Ping ipv6
    Explanation
    To verify that a 128-bit address is live and responding, you can use the "ping ipv6" command. This command specifically checks for the connectivity of IPv6 addresses. By sending an ICMPv6 echo request to the specified address, the command will determine if the address is active and able to respond. This is useful for troubleshooting network connectivity and ensuring that the address is reachable.

    Rate this question:

  • 20. 

    Refer to the exhibit. lf RTRO1 is configured as shown, Which three addresses will be received by other routers that are running ElGRP on the network? (Choose three.)

    • A.

      10.0.0.0

    • B.

      172.16.4.0

    • C.

      172.16.0.0

    • D.

      192.168.2.0

    • E.

      192.168.0.0

    • F.

      10.4.3.0

    Correct Answer(s)
    A. 10.0.0.0
    C. 172.16.0.0
    D. 192.168.2.0
    Explanation
    Based on the exhibit, the network configuration shows that RTRO1 is advertising three networks: 10.0.0.0, 172.16.0.0, and 192.168.2.0. These networks will be received by other routers running EIGRP on the network. The other networks mentioned in the options (172.16.4.0, 192.168.0.0, and 10.4.3.0) are not advertised by RTRO1 and therefore will not be received by other routers.

    Rate this question:

  • 21. 

    How is the redundancy represented in ntp master?

    • A.

      N-1

    • B.

      N+1

    • C.

      1:N

    • D.

      N:1

    Correct Answer
    B. N+1
    Explanation
    In the context of NTP (Network Time Protocol), the redundancy is represented by the "N+1" option. This means that there are N primary time servers and one backup time server. The backup server is ready to take over the time synchronization duties in case any of the primary servers fail or become unavailable. Having this redundancy ensures that there is always a reliable source of accurate time for the network.

    Rate this question:

  • 22. 

    Which two options are fields in an Ethernet frame? (Choose two.)

    • A.

      Frame check sequence

    • B.

      Header

    • C.

      Type

    • D.

      Source IP address

    • E.

      Destination IP address

    Correct Answer(s)
    A. Frame check sequence
    C. Type
    Explanation
    The frame check sequence is a field in an Ethernet frame that is used for error detection and ensures the integrity of the data being transmitted. The type field identifies the protocol being used in the frame, such as IPv4 or IPv6. Both of these fields are essential components of an Ethernet frame.

    Rate this question:

  • 23. 

    Which two statements about UDP are true? (Choose two)

    • A.

      It uses a three-way handshake to ensure that traffic is transmitted properly

    • B.

      It can transmit data at a rate higher than the path capacity

    • C.

      It can be used for multicast and broadcast traffic

    • D.

      It guarantees packet delivery

    • E.

      It includes protection against duplicate packets

    Correct Answer(s)
    B. It can transmit data at a rate higher than the path capacity
    C. It can be used for multicast and broadcast traffic
    Explanation
    UDP (User Datagram Protocol) is a connectionless protocol that does not use a three-way handshake to ensure proper transmission of traffic. Therefore, the statement "It uses a three-way handshake to ensure that traffic is transmitted properly" is false. UDP can transmit data at a rate higher than the path capacity because it does not perform flow control, making it suitable for real-time applications. It can also be used for multicast and broadcast traffic, allowing data to be sent to multiple recipients simultaneously. However, UDP does not guarantee packet delivery, and it does not include protection against duplicate packets.

    Rate this question:

  • 24. 

    What does it take for BGP to establish connection? (Choose two.)

    • A.

      Enable CDP

    • B.

      IGP

    • C.

      EGP

    • D.

      AS number on local router

    • E.

      AS number on remote router

    Correct Answer(s)
    D. AS number on local router
    E. AS number on remote router
    Explanation
    BGP (Border Gateway Protocol) requires the AS (Autonomous System) number to be configured on both the local and remote routers in order to establish a connection. The AS number is a unique identifier assigned to each autonomous system on the internet. By configuring the AS numbers on both routers, BGP can establish a connection and exchange routing information between them. Enabling CDP (Cisco Discovery Protocol), IGP (Interior Gateway Protocol), and EGP (Exterior Gateway Protocol) are not necessary for BGP to establish a connection.

    Rate this question:

  • 25. 

    Which two statements about configuring an EtherChannel on a Cisco switch are true? (Choose two.)

    • A.

      An EtherChannel can operate in Layer 2 mode only

    • B.

      The interfaces configured in the EtherChannel must operate at the same speed and duplex mode

    • C.

      The interfaces configured in the EtherChannel must be on the same physical switch

    • D.

      The interfaces configured in the EtherChannel must be part of the same VLAN or trunk

    • E.

      The interfaces configured in the EtherChannel must have the same STP port path cost

    Correct Answer(s)
    B. The interfaces configured in the EtherChannel must operate at the same speed and duplex mode
    D. The interfaces configured in the EtherChannel must be part of the same VLAN or trunk
    Explanation
    The first statement, "The interfaces configured in the EtherChannel must operate at the same speed and duplex mode," is true because for an EtherChannel to function properly, all interfaces within the channel need to have the same speed and duplex settings. This ensures that there is no mismatch or inconsistency in the transmission of data.

    The fourth statement, "The interfaces configured in the EtherChannel must be part of the same VLAN or trunk," is also true because in order to create an EtherChannel, the interfaces must be either in the same VLAN or be trunk ports. This allows for the aggregation of multiple links into a single logical link, providing increased bandwidth and redundancy.

    Rate this question:

  • 26. 

    Which two statements about IPv6 anycast addresses are true? (Choose two.)

    • A.

      They receive packets on the closest interface that is discovered by the routing protocol

    • B.

      They are allocated from the IPv6 broadcast address space

    • C.

      They are used in conjunction with source-specific multicast for IPv6

    • D.

      They use the prefix FC00::/8

    • E.

      They are allocated from the IPv6 unicast address space

    Correct Answer(s)
    A. They receive packets on the closest interface that is discovered by the routing protocol
    E. They are allocated from the IPv6 unicast address space
    Explanation
    Anycast addresses in IPv6 receive packets on the closest interface that is discovered by the routing protocol. This means that when multiple interfaces have the same anycast address assigned, the routing protocol will direct incoming packets to the interface that is geographically closest to the sender. Anycast addresses are allocated from the IPv6 unicast address space, not from the broadcast address space.

    Rate this question:

  • 27. 

    If you change the weight and distance parameters on a device with an established BGP neighbor, which additional task must you perform to allow the two devices to continue exchanging routes?

    • A.

      Reset the BGP connections on the device

    • B.

      Reset the gateway interface

    • C.

      Clear the IP routes on the device

    • D.

      Change the weight and distance settings on the other device to match

    Correct Answer
    A. Reset the BGP connections on the device
    Explanation
    When you change the weight and distance parameters on a device with an established BGP neighbor, you need to reset the BGP connections on the device. This is because BGP uses TCP connections to establish and maintain neighbor relationships. When you change the weight and distance parameters, it can affect the BGP decision-making process and the routes exchanged between the devices. By resetting the BGP connections, you ensure that the devices reestablish their neighbor relationships and exchange the updated routes based on the new weight and distance settings.

    Rate this question:

  • 28. 

    Which two features can you enable on a switch to capture and analyze frames that transit an interface? (Choose two.)

    • A.

      SNMP

    • B.

      NetFlow

    • C.

      IP SLA

    • D.

      SPAN

    • E.

      RSPAN

    Correct Answer(s)
    D. SPAN
    E. RSPAN
    Explanation
    SPAN and RSPAN are two features that can be enabled on a switch to capture and analyze frames that transit an interface. SPAN (Switch Port Analyzer) allows the monitoring of network traffic by copying incoming and outgoing traffic on one or more ports to a designated monitoring port. RSPAN (Remote Switch Port Analyzer) extends this capability to remote switches, allowing the monitoring of traffic on multiple switches across a network. SNMP (Simple Network Management Protocol), NetFlow, and IP SLA are not specifically designed for capturing and analyzing frames, making them incorrect choices.

    Rate this question:

  • 29. 

    Which two statements about Cisco Discovery Protocol are true? (Choose two.)

    • A.

      It is used to initiate a VTP server and cient relationship

    • B.

      It uses SNMP to share device information to an external server

    • C.

      It runs on the data link layer only

    • D.

      It runs on the network layer and the data link layer

    • E.

      It uses TLVs to share device information

    Correct Answer(s)
    C. It runs on the data link layer only
    E. It uses TLVs to share device information
    Explanation
    Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol used to share device information between Cisco devices. It runs on the data link layer only, providing information about neighboring devices. It does not operate on the network layer. CDP uses Type Length Value (TLV) format to share device information such as device ID, software version, and IP addresses. It is not used to initiate a VTP server and client relationship, nor does it use SNMP to share device information to an external server.

    Rate this question:

  • 30. 

    Which two statements describe key differences between single and dual-homed WAN connections? (Choose two.)

    • A.

      Dual-homed WAN connections are more expensive than single-homed connections

    • B.

      Dual-homed WAN connections have more management-application overhead than single-homed connections

    • C.

      Dual-homed WAN connections require more skill to administer than single-homed connections

    • D.

      Dual-homed WAN connections have a simpler topology than single-homed connections

    • E.

      Dual-homed WAN connections have higher WAN speed than single- homed connections

    Correct Answer(s)
    A. Dual-homed WAN connections are more expensive than single-homed connections
    C. Dual-homed WAN connections require more skill to administer than single-homed connections
    Explanation
    Dual-homed WAN connections are more expensive than single-homed connections because they require additional hardware and redundancy to ensure high availability. Additionally, dual-homed connections require more skill to administer as they involve configuring and managing multiple connections and ensuring proper failover and load balancing.

    Rate this question:

  • 31. 

    Which QoS feature can drop traffic that exceeds the committed access rate?

    • A.

      Policing

    • B.

      FIFO

    • C.

      Shaping

    • D.

      Weighted fair queuing

    Correct Answer
    A. Policing
    Explanation
    Policing is a QoS feature that can drop traffic that exceeds the committed access rate. Policing is used to enforce a specific bandwidth limit on a network interface or traffic flow. It monitors the incoming traffic and checks if it exceeds the allowed rate. If the traffic exceeds the limit, policing can drop or mark the excess packets, ensuring that the network resources are not overwhelmed and maintaining the quality of service for other traffic flows.

    Rate this question:

  • 32. 

    Refer to the exhibit. Traffic on the control plane uses which VLAN ?

    • A.

      VLAN 1

    • B.

      VLAN 10

    • C.

      VLAN 5

    • D.

      VLAN 20

    Correct Answer
    B. VLAN 10
    Explanation
    The exhibit is not available, so a specific explanation cannot be provided.

    Rate this question:

  • 33. 

    Which two conditions can be used to elect the spanning-tree root bridge? (Choose two.)

    • A.

      The highest MAC address

    • B.

      The lowest MAC address

    • C.

      The highest port priority

    • D.

      The lowest system ID

    • E.

      The lowest switch priority

    Correct Answer(s)
    B. The lowest MAC address
    E. The lowest switch priority
    Explanation
    The spanning-tree root bridge is elected based on two conditions: the lowest MAC address and the lowest switch priority. The MAC address is a unique identifier assigned to each network device, and the switch with the lowest MAC address will become the root bridge. The switch priority is a value that can be manually configured, and the switch with the lowest priority will also become the root bridge. These two conditions ensure that the root bridge is selected in a deterministic manner based on specific criteria.

    Rate this question:

  • 34. 

    Which two cable specifications can support 1-Gbps Ethernet? (Choose two.)

    • A.

      Category 5e

    • B.

      RG11

    • C.

      RG-6

    • D.

      Category 6

    • E.

      Category 3

    Correct Answer(s)
    A. Category 5e
    D. Category 6
    Explanation
    Category 5e and Category 6 cables are capable of supporting 1-Gbps Ethernet. These cable specifications have the necessary bandwidth and performance capabilities to handle the high data transmission rate required for 1-Gbps Ethernet. RG11 and RG-6 cables are typically used for video and television applications, while Category 3 cables are older and have lower bandwidth, making them unsuitable for 1-Gbps Ethernet.

    Rate this question:

  • 35. 

    Which type of device should you use to preserve IP addresses on your network?

    • A.

      WLAN controller

    • B.

      Load balancer

    • C.

      Firewall

    • D.

      Intrusion prevention device

    Correct Answer
    C. Firewall
    Explanation
    A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. By using a firewall, you can preserve IP addresses on your network by controlling access to and from specific IP addresses, preventing unauthorized access and preserving the integrity of your network.

    Rate this question:

  • 36. 

    Which value is included in the initial TCP SYN message?

    • A.

      A session ID

    • B.

      A TTL number

    • C.

      An acknowledgment number

    • D.

      Sequence number

    Correct Answer
    D. Sequence number
    Explanation
    In the initial TCP SYN message, the sequence number is included. The sequence number is used to keep track of the order of the packets being sent and received. It helps in ensuring that the packets are reassembled correctly at the receiving end. By including the sequence number in the SYN message, the sender can establish a reliable communication channel with the receiver.

    Rate this question:

  • 37. 

    At which severity level can syslog logging begin to affect router performance?

    • A.

      Emergency

    • B.

      Debugging

    • C.

      Notification

    • D.

      Critical

    Correct Answer
    A. Emergency
    Explanation
    Syslog logging at the severity level of "emergency" can begin to affect router performance. This is because emergency level logging is the highest severity level, indicating critical system failures or conditions that require immediate attention. When the router is logging at this level, it is likely generating a large volume of logs, which can consume system resources and impact performance. Therefore, it is important to carefully consider the severity level used for syslog logging to balance the need for information with the potential impact on router performance.

    Rate this question:

  • 38. 

    Refer to the exhibit. What is the effect of the configuration?

    • A.

      Traffic from PC B is sent untagged when it uses the trunk to communicate with PCA

    • B.

      Traffic from PC B is dropped when it uses the trunk to communicate with PC A

    • C.

      Traffic from PC A is dropped when it uses the trunk to communicate with PC B

    • D.

      Traffic from PC A is sent untagged when it uses the trunk to communicate with PC B

    Correct Answer
    B. Traffic from PC B is dropped when it uses the trunk to communicate with PC A
    Explanation
    The given configuration is dropping traffic from PC B when it uses the trunk to communicate with PC A. This means that any data sent from PC B to PC A through the trunk will not reach its destination and will be discarded.

    Rate this question:

  • 39. 

    Which feature or utility enables a switch or router to monitor network performance and availability using a responder?

    • A.

      IP SLA

    • B.

      NetFlow

    • C.

      Ping

    • D.

      Traceroute

    Correct Answer
    A. IP SLA
    Explanation
    IP SLA (Internet Protocol Service Level Agreement) is a feature or utility that enables a switch or router to monitor network performance and availability using a responder. It allows network administrators to measure network performance metrics such as delay, jitter, and packet loss. By sending synthetic traffic to a specific destination and analyzing the responses, IP SLA provides valuable insights into network performance and helps in troubleshooting network issues. It is a powerful tool for network monitoring and optimization.

    Rate this question:

  • 40. 

    Which effect does the AAA new-model coniguration command have?

    • A.

      It configures the device to connect to a RADIUS server for AAA

    • B.

      It enables AAA services on the device

    • C.

      It associates a RADIUS server to an AAA group

    • D.

      It configures a local user on the device

    Correct Answer
    B. It enables AAA services on the device
    Explanation
    The correct answer is that the "AAA new-model" configuration command enables AAA services on the device. AAA stands for Authentication, Authorization, and Accounting, and it is a security framework used to control access to network resources. By enabling AAA services on the device, it allows for the authentication of users, authorization of their access privileges, and accounting of their network usage. This command is typically used in Cisco devices to enable AAA functionality.

    Rate this question:

  • 41. 

    Which symptom can cause duplex mismatch problem?

    • A.

      No earner

    • B.

      Giants

    • C.

      Collisions on interface

    • D.

      CRC errors

    Correct Answer
    C. Collisions on interface
    Explanation
    Collisions on the interface can cause a duplex mismatch problem. Duplex mismatch occurs when two connected devices have different duplex settings, such as one device operating in full-duplex mode while the other is in half-duplex mode. This mismatch can lead to collisions on the interface, where both devices try to transmit data at the same time, resulting in data loss and performance issues. Therefore, collisions on the interface can be a symptom of a duplex mismatch problem.

    Rate this question:

  • 42. 

    Which statement about spanning-tree root-bridge election is true?

    • A.

      It is always performed automatically

    • B.

      Each VLAN must use the same root bridge

    • C.

      Each root bridge must reside on the same root switch

    • D.

      Each VLAN must have its own root bridge

    Correct Answer
    D. Each VLAN must have its own root bridge
    Explanation
    In a spanning-tree network, each VLAN must have its own root bridge. This is because the root bridge is elected based on the bridge ID, which consists of a priority value and the MAC address of the switch. By default, the switch with the lowest bridge ID becomes the root bridge for a particular VLAN. Therefore, each VLAN can have a different root bridge based on the bridge ID. This allows for load balancing and redundancy in the network.

    Rate this question:

  • 43. 

    Which two statements about fiber cable are true? (Choose two.)

    • A.

      Single-mode fiber supports SC and LC connectors only

    • B.

      Single-mode cable is most appropriate for installations longer than 10 km

    • C.

      Fiber cable is relatively inexpensive and supports a higher data rate than coaxial cable

    • D.

      Multimode cable supports speeds between 100 Mbps and 100 Gbps

    • E.

      Multimode cable supports speeds between 100 Mbps and 9.92 Gbps

    Correct Answer(s)
    B. Single-mode cable is most appropriate for installations longer than 10 km
    D. Multimode cable supports speeds between 100 Mbps and 100 Gbps
    Explanation
    The first statement, "Single-mode cable is most appropriate for installations longer than 10 km," is true because single-mode fiber is designed to carry signals over long distances with low signal loss.

    The fourth statement, "Multimode cable supports speeds between 100 Mbps and 100 Gbps," is also true because multimode fiber is capable of supporting a range of speeds, from 100 Mbps to 100 Gbps, depending on the specific type of multimode fiber being used.

    Rate this question:

  • 44. 

    What is the benefit of point-to-point leased line?

    • A.

      Simple configuration

    • B.

      Low cost

    • C.

      Full-mesh capability

    • D.

      Flexibility of design

    Correct Answer
    A. Simple configuration
    Explanation
    A point-to-point leased line offers the benefit of simple configuration. This means that setting up the connection between two locations is straightforward and does not require complex network configurations. This simplicity can save time and effort during the installation process.

    Rate this question:

  • 45. 

    Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?

    • A.

      WRED

    • B.

      PQ

    • C.

      FIFO

    • D.

      WFQ

    Correct Answer
    B. PQ
    Explanation
    Priority Queuing (PQ) is the correct answer because it allows voice traffic to be given higher priority over data traffic. This ensures that voice packets are transmitted with minimal delay and jitter, which is crucial for maintaining voice quality. By assigning voice traffic to a separate priority queue, it can be processed and transmitted ahead of data traffic, optimizing the network for voice communication.

    Rate this question:

  • 46. 

    What two statements about CDP are true? (Choose two.)

    • A.

      CDP runs on the data link layer only

    • B.

      CDP uses SNMP to share device information to an external server

    • C.

      CDP runs on the network layer and the data link layer

    • D.

      CDP used to initiate a VTP server and client relationship

    • E.

      CDP uses TLVs to share device information

    Correct Answer(s)
    A. CDP runs on the data link layer only
    E. CDP uses TLVs to share device information
    Explanation
    CDP (Cisco Discovery Protocol) is a proprietary Cisco protocol used to share information about directly connected Cisco devices. It runs on the data link layer, allowing devices to discover and learn about each other on the same network segment. CDP does not operate on the network layer. It uses TLVs (Type, Length, Value) to share device information such as device ID, software version, and IP address. SNMP (Simple Network Management Protocol) is a different protocol used for network management and monitoring, not for sharing device information via CDP. Therefore, the correct statements are: CDP runs on the data link layer only, and CDP uses TLVs to share device information.

    Rate this question:

  • 47. 

    Which option is a invalid hostname for a switch?

    • A.

      Switch-Cisco!

    • B.

      5witch-Cisco

    • C.

      5witchCisc0

    • D.

      SwitchCisc0

    Correct Answer
    A. Switch-Cisco!
    Explanation
    The option "Switch-Cisco!" is an invalid hostname for a switch because it contains an exclamation mark, which is not allowed in a hostname. Hostnames can only consist of letters, numbers, and hyphens, and they cannot start or end with a hyphen. Therefore, "Switch-Cisco!" does not meet the criteria for a valid hostname.

    Rate this question:

  • 48. 

    Which two statements are true for multicast MAC address directions? (Choose two.)

    • A.

      01:00:5E:xx:xx:xx

    • B.

      01 00 xx xxxxxxx

    • C.

      02 xx xxxxxxx

    • D.

      One to one

    • E.

      One to many

    Correct Answer(s)
    A. 01:00:5E:xx:xx:xx
    E. One to many
    Explanation
    The multicast MAC address range is 01:00:5E:xx:xx:xx, which means that the first byte starts with 01 and the second byte starts with 00. This range is reserved for multicast addresses. Multicast addresses are used for one-to-many communication, where a single packet is sent to multiple recipients. Therefore, the statements "01:00:5E:xx:xx:xx" and "one to many" are both true for multicast MAC address directions.

    Rate this question:

  • 49. 

    Which of the three options are switchport configurations that can always avoid duplex mismatch errors between two switches? (Choose three.)

    • A.

      Set one side of the connection to the full duplex and the other side to half duplex

    • B.

      Set both sides of the connection to full duplex

    • C.

      Set one side of the connection to auto-negotiate and the other side to half duplex

    • D.

      Set one side of the connection to auto-negotiate and the other side to full duplex

    • E.

      Set both sides of the connection to auto-negotiate

    • F.

      Set both sides of the connection to half duplex

    Correct Answer(s)
    B. Set both sides of the connection to full duplex
    E. Set both sides of the connection to auto-negotiate
    F. Set both sides of the connection to half duplex
    Explanation
    Setting both sides of the connection to full duplex ensures that both switches are communicating at the same speed and in the same direction, eliminating the possibility of a duplex mismatch. Setting both sides of the connection to auto-negotiate allows the switches to automatically determine the appropriate duplex setting based on their capabilities, avoiding any mismatch errors. Setting both sides of the connection to half duplex may also work, but it limits the communication to one direction at a time, potentially reducing network performance.

    Rate this question:

  • 50. 

    Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are operating at the same bandwidth? (Choose three.)

    • A.

      Switch A – Fa0/0

    • B.

      Switch A – Fa0/1

    • C.

      Switch B – Fa0/0

    • D.

      Switch B – Fa0/1

    • E.

      Switch C – Fa0/0

    • F.

      Switch C – Fa0/1

    Correct Answer(s)
    B. Switch A – Fa0/1
    C. Switch B – Fa0/0
    D. Switch B – Fa0/1
    Explanation
    The designated ports in STP are the ports that are chosen as the primary path for forwarding traffic in each segment. In this topology, the designated ports will be the ports that have the lowest cost to reach the root bridge. Since the question states that all the links are operating at the same bandwidth, the cost to reach the root bridge will be the same for all ports. Therefore, the designated ports will be Switch A - Fa0/1, Switch B - Fa0/0, and Switch B - Fa0/1.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 02, 2019
    Quiz Created by
    Milosavljevicvm
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.