Thursday 2 August 2012

CCNA Objective Type Questions, CCNA Multiple Choice Questions and Answers for free

1.    When are link-state packets sent to neighbors?
2.    Why is it difficult for routing loops to occur in networks that use link-state routing?
3.    What two statements correctly describe the link state routing process?
4.    What action does a link-state router take immediately upon receipt of an LSP from a neighboring router?
5.    What two events will cause a link state router to send LSPs to all neighbors?
6.    Refer to the exhibit. What does JAX do with link-state packets from ORL?
7.    Which database or table must be identical on all link-state routers within an area in order to construct an accurate SPF tree?
8.    What feature do modern link-state protocols provide to minimize processing and memory requirements?
9.    What is the final step in the link state routing process?
10.    What are two advantages of using a link-state routing protocol instead of a distance vector routing protocol?     

11.     Which algorithm is run by link-state routing protocols to calculate the shortest path to destination networks?
12.    Which routers will router D receive hello packets?
13.    What speeds up convergence in a network using link-state routing?
14.    Refer to the exhibit. What kind of information would be seen in an LSP sent from router JAX to router ATL?
15.    Which two routing protocols use Dijkstra’s shortest path first algorithm?
16.    Refer to the exhibit. Router B receives a packet with a destination address of 10.16.1.97. What will router B do?
17.    A network is converged and the routing tables are complete. When a packet needs to be forwarded, what is the first criterion used to determine the best path in the routing table?
18.    Refer to the exhibit. Which statement correctly describes this network?
19.    The following entry is displayed in the routing table:R 192.168.8.0/24 [120/2] via 192.168.4.1, 00:00:26, Serial0/0/1 What type of route is this?
20.    What determines if the router implements a classless route lookup process?
21.    Refer to the exhibit. How many routes in this output qualify for use as ultimate routes?
22.   What happens when the transport input ssh command is entered on the switch vty lines?

23.    Refer to the exhibit. What protocol was used to distribute the routing information for the network 172.16.1.4?
24.    Refer to the exhibit. What can be determined from this output?
25.    Refer to the exhibit. The graphic contains partial contents of the routing table on router E. Router E is running version 12.3 of the IOS and is configured for default routing behavior. Router E receives a packet to forward. Which route in the routing table will be searched first and why?
26.    Refer to the exhibit. Router1 is running IOS version 12.2. What will the network administrator need to do so that packets for unknown child routes of 172.16.0.0/24 will not be dropped?
27.    Refer to the exhibit. With the ip classless command issued, what will router R2 do with a packet destined for host 172.16.4.234?
28.    A router has the following entries in its routing table:S 192.168.0.0/24 [1/0] via 192.168.128.2O 192.168.0.0/25 [110/2175] via 172.16.1.1, 00:02:15, FastEthernet0/1D 192.168.0.0/25 [90/22455] via 172.16.2.2, 00:12:15, Serial0/0/0R 192.168.0.0/26 [120/2] via 172.16.3.3, 00:00:15, Serial0/0/1The router receives a packet that is destined for a host with the address 192.168.0.58.Which route would this router use to forward the packet?
29.    Refer to the exhibit. What parent network will automatically be included in the routing table when the three subnets are configured on Router1?
30.    Refer to the exhibit. What subnet mask will Router1 apply to child routes of the 172.16.0.0/24 network?    
31.    Refer to the exhibit. The network administrator has discovered that packets destined for servers on the 172.16.254.0 network are being dropped by Router2. What command should the administrator issue to ensure that these packets are sent out the gateway of last resort, Serial 0/0/1?
32.    Refer to the exhibit. A packet destined for host 128.107.0.5/16 is processed by the JAX router. After finding the static route in the routing table that matches the destination network for this packet, what does the router do next?
33.    What occurs when no ip classless is implemented on the router?
34.    A route to a destination network is learned from multiple routing protocols. What is used by a Cisco router to select the preferred route to the destination that will be installed in the routing table?
35.    If a router cannot find a valid configuration file during the startup sequence, what will occur?
36.    Refer to the exhibit. The network administrator has configured the router with the interface IP addresses shown for the directly connected networks. Pings from the router to hosts on the connected networks or pings between router interfaces are not working. What is the most likely problem?
37.    Refer to the exhibit. What can be concluded from the routing table output in the exhibit? 
38.    Refer to the exhibit. The frame shown in the exhibit was received by the router. The router interfaces are operational. How will the router process this frame? 
39.    Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. 
40.    Which two statements correctly describe the components of a router? 
41.    Refer to the exhibit. After host 2 is connected to the switch on the LAN, host 2 is unable to communicate with host 1. What is the cause of this problem?
42.    Which are functions of a router? 
43.    Refer to the exhibit. All routers have a route in its routing table to each network that is shown in the exhibit. Default routes have not been issued on these routers. What can be concluded about how packets are forwarded in this network? 
44.    The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? 
45.    Refer to the exhibit. What can be concluded from the output of the running-configuration of a router?
46.    The commands that are displayed determine the current operation of the router.
47.    What is the outcome of entering these commands?R1(config)# line vty 0 4R1(config-line)# password check123R1(config-line)# login
48.    Which of the following is the correct flow of routines for a router startup?
49.    What three processes does a router execute when it receives a packet from one network that is destined for another network? 
50.    The network administrator needs to connect two routers directly via their FastEthernet ports. What cable should the network administrator use?
51.    Which two statements describe characteristics of load balancing? 
52.    What information about the router and its startup process can be gathered from the output of the show version command? 
53.    Which interfaces in the exhibit could be used for a leased line WAN connection? 
54.    From what location can a router load the Cisco IOS during the boot process? 
55.    A network administrator has just entered new configurations into Router1. Which command should be executed to save configuration changes to NVRAM?
56.    What is the default sequence for loading the configuration file?
57.     What header address information does a router change in the information it receives from an attached Ethernet interface before information is transmitted out another interface?
58.    Refer to the exhibit. What action does SW1 take on a frame sent from PC_A to PC_C if the MAC address table of SW1 is empty?
59.    Which command line interface (CLI) mode allows users to configure switch parameters, such as the hostname and password?
60.    When a collision occurs in a network using CSMA/CD, how do hosts with data to transmit respond after the backoff period has expired?
61.    Refer to the exhibit. The switch and workstation are administratively configured for full-duplex operation. Which statement accurately reflects the operation of this link?
62.    Refer to the exhibit. The switch and the hub have default configurations, and the switch has built its CAM table. Which of the hosts will capture a copy of the frame when workstation A sends a unicast packet to workstation C?
63.    Refer to the exhibit. How many collision domains are depicted in the network?
64.    When a switch receives a frame and the source MAC address is not found in the switching table, what action will be taken by the switch to process the incoming frame?
65.    Which two statements about Layer 2 Ethernet switches are true? 
66.    A network administrator uses the CLI to enter a command that requires several parameters. The switch responds with “% Incomplete command”. The administrator cannot remember the missing parameters. What can the administrator do to get the parameter information? append ?
67.    Where is the startup configuration stored?
68.    If a network administrator enters these commands in global configuration mode on a switch, what will be the result?
69.    To secure the console port with the password “cisco” to deny access to the console port by specifying 0 lines are available to gain access to line configuration mode by supplying the required password to configure the privilege exec password that will be used for remote access problem?
70.    Which two statements are true about EXEC mode passwords? 
71.    Refer to the exhibit. The exhibit shows partial output of the show running-config command. The enable password on this switch is “cisco.” What can be determined from the output shown?
72.    Which statement is true about the command banner login “Authorized personnel Only” issued on a switch?
73.    What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? 
74.    Which two statements are true regarding switch port security? 
75.    Refer to the exhibit. What happens when Host 1 attempts to send data?