CCNA (ICND2) Cert Practice Exam
-
1. Question
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? -
2. Question
Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.) -
3. Question
-
4. Question
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which task has to be performed on Router 1 for it to establish an OSPF adjacency with Router 2?
-
5. Question
-
6. Question
Which address type is not supported in IPv6? -
7. Question
Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?
-
8. Question
A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router? -
9. Question
-
10. Question
A network administrator is designing an IPv4 addressing scheme and requires these subnets.1 subnet of 100 hosts
2 subnets of 80 hosts
2 subnets of 30 hosts
4 subnets of 20 hostsWhich combination of subnets and masks will provide the best addressing plan for these requirements?
-
11. Question
A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet?
-
12. Question
When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified? -
13. Question
-
14. Question
How many /30 subnets can be created from one /27 subnet? -
15. Question
Fill in the blank.
When port security is enabled, a switch port uses the default violation mode of shutdown until specifically configured to use a different violation mode. -
16. Question
-
17. Question
What is the purpose of setting the native VLAN separate from data VLANs? -
18. Question
Refer to the exhibit. All the routers that are displayed are part of the EIGRP domain. Assuming EIGRP metric weights are not altered in the configurations, which path will a packet take that originates from a host on the 192.168.1.0/24 network and is going to a host on the 192.168.2.0/24 network?
-
19. Question
If no bridge priority is configured in PVST, which criteria is considered when electing the root bridge? -
20. Question
-
21. Question
-
22. Question
Which is a characteristic of EtherChannel? -
23. Question
-
24. Question
An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.) -
25. Question
What is the most likely cause when the output of the show interface command shows that a switch interface is up but the line protocol is down? -
26. Question
What are two WAN connection enhancements that are achieved by implementing PPPoE? (Choose two.) -
27. Question
-
28. Question
Fill in the blank. Use only an acronym. PPPoE creates a PPP tunnel through the DSL connection for the purpose of sending PPP frames.
-
29. Question
-
30. Question
What two STP features are incorporated into Rapid PVST+? (Choose two.) -
31. Question
What are two load-balancing methods in the EtherChannel technology? (Choose two.) -
32. Question
Which WAN technology can serve as the underlying network to carry multiple types of network traffic such as IP, ATM, Ethernet, and DSL? -
33. Question
Which WAN connectivity method would be used in a remote location where there are no service provider networks? -
34. Question
How many 64 kb/s voice channels are combined to produce a T1 line? -
35. Question
-
36. Question
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Why are users in the OSPF network not able to access the Internet? -
37. Question
-
38. Question
An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation? -
39. Question
-
40. Question
-
41. Question
Which three statements characterize UDP? (Choose three.) -
42. Question
What are two reasons why an administrator might choose to use static routing rather than dynamic routing? (Choose two.) -
43. Question
-
44. Question
How will a router handle static routing differently if Cisco Express Forwarding is disabled? -
45. Question
An OSPFv3 router has no IPv4 addresses configured and the router ID has not been manually set. What is the result of this configuration? -
46. Question
What type of installation is needed to view syslog messages? -
47. Question
Which two things should a network administrator modify on a router to perform password recovery? (Choose two.) -
48. Question
What effect does the default-information originate command have on a Cisco router that is configured for RIP? -
49. Question
What information can be verified through the show ip dhcp binding command? -
50. Question
-
51. Question
What are three characteristics of the CSMA/CD process? (Choose three.) -
52. Question
Which ACE would permit traffic from hosts only on the 192.168.8.0/22 subnet? -
53. Question
-
54. Question
What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command? -
55. Question
-
56. Question
Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.) -
57. Question
Which address prefix range is reserved for IPv4 multicast? -
58. Question
Which IPv6 prefix is reserved for communication between devices on the same link? -
59. Question
-
60. Question
-
61. Question
-
62. Question
Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports? -
63. Question
Which two protocols are used to provide server-based AAA authentication? (Choose two.) -
64. Question
Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) -
65. Question
Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts? -
66. Question
-
67. Question