NetworkDesigner.net: For when you can't afford to fail the exam.

Networkdesigner.net Forums
Home | Profile | Register | Active Topics | Members | Search | FAQ
Username:
Password:
Save Password
Forgot your Password?
 
 All Forums
 CCNA
 CCNA difficult questions
 New Topic  Reply to Topic
 Printer Friendly
 
Author Previous Topic Topic Next Topic  
[email protected]
New Member



1 Posts
Posted - Dec 04 2001 :  12:57:39 AM  Show Profile  Reply with Quote
Does anyone know the answers to these? please email me. Thx c002928

158. Which command assigns the login password 'cisco' on the console terminal line?

A. line vty 0
Log in
Password Cisco

B. Line console
Login
Password Cisco

C. Line login terminal
Password Cisco

D. Line console 0
Login
Password cisco

E. Line console 0
Login
Password CISCO

161. IP RIP routing is configured on a router but not all interfaces are attached to RIP networks. What should you use to prevent all RIP routing updates from being sent through selected interfaces without using access lists?

A. Passive route
B. Default route
C. Passive interface
D. Route update filtering

162. Which part of LAN segmentation device enables high-speed data exchange?

A. A hub
B. A bridge
C. A switch
E. A repeater


163. What is the disadvantage of using connection-oriented protocols such as TCP?

A. Packet acknowledgement may add overhead.
B. Packets are not tagged with sequence numbers.
C. Loss of duplication of data packets is most likely to occur.
D. The application layer must assume responsibility for correct sequencing of the data packets.

164. What is an advantage of Local Area Network (LAN) segmentation?

A. Smaller collision domains
B. Elimination of broadcasts
C. Decreased cost of implementation
D. Larger number of users within the same domain

165. What are two ways IPX supports multiple logical networks on an individual interface? (Choose two)

A. Network number
B. Routing protocol
C. Encapsulation type
D. Autonomous system number

166. Which two statements about a bridge are true? (Choose two)

A. A bridge floods multicast
B. A bridge floods broadcast
C. A bridge does not flood multicast
D. A bridge does not flood broadcast

167. What is not a characteristic of the network segment on a switch?

A. The segment has its own collision domain.
B. The segment can translate from one media to a different media.
C. All devices in the segment are part of the same broadcast domain.
D. One device per segment can concurrently send frames to the switch.

168. Which command displays the IP addresses applying to specific host names?

A. show host
B. show interface
C. ping host name
D. config host name
E. show host mapping
F. show host name IP address
G. trace IP addresses host name

169. In which layer of the OSI model does the ping command operate?

A. Session
B. Network
C. Transport
D. Maintenance

170. Which commands should you use to enable IGRP routing?

A. Router IGRP 100
network 192.168.1.0
network 10.0.0.0

B. Router IGRP 100
network 192.168.1.0
network 10.2.0.0

C. Router IGRP 100
network 192.168.1.0 192.168.1.1
network 10.2.0.0 10.2.1.1

D. Router IGRP 100
network 192.168.1.0 255.255.255.0
network 10.2.0.0 255.255.0.0

171. Which element is used to define the rate in bits per second that a frame relay switch agrees to transfer data?

A. The clock rate (CR)
B. The committed information rate (CIR)
C. The local management interface (LMI)
D. The data link connection identifier (DLCI)
E. The committed rate measurement interval (CRMI)

172. Which command verifies encapsulation as well as layer-1 and layer-2 statistics on a router configured for frame relay?

A. show IP
B. show interface
C. show statistics
D. show frame-relay

173. Which configuration mode and command combination sets the bandwidth metric of a frame relay connection?

A. router (config)# clock rate 56
B. router (config-IF)# bandwidth 56
C. router (config)# bandwidth 56000
D. router (config)# clock rate 56000

174. Which router command allows you to view the entire contents of all access lists?

A. router # the command show interface
B. router > the command show IP interface
C. router # show access-list
D. router > show all access-list

175. Which router command allows you to determine if an IP access list is enabled on a particular interface?

A. at the router # show IP interface
B. router > prompt show access-list
C. router # show IP access-list
D. router > show interface IP access-list

176. Which range of possible numbers do standard IP access-lists have?

A. 1 - 99
B. 600 - 699
C. 800 - 899
D. 1000 - 1099

177. Given the configuration example:

Interface, Ethernet 0, IPX network, 4a
IPX access group 800x
Interface Ethernet 1
IPX network 3d
Interface Ethernet 2
IPX network 5c
Access-list 800 permit 3d 4a

Which two actions result from implementing Ethernet in this configuration? (Choose two)

A. IPX network 5c will not receive any traffic.
B. Traffic from network 3d from 4a will be forwarded out e0.
C. Traffic from network 4a for network 3d will be forwarded out e0.
D. Traffic from network 3d destined for network 4a will be forwarded out of e2.
E. The access-list is applied to an outgoing interface and filters outbound traffic.

178. Which two statements are true? (Choose two)

A. Ethernet 802.3 utilizes the hot duplex method for data transfer
B. In a 100 megabit point-to-point connection a full duplex connection can provide 400 megabits of data transfer.
C. Ethernet switches can use the full duplex mode to connect multiple modes on a single port of a switch.
D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception.

179. When you issue the command ‘Show Version,’ your router returns ‘Configuration registration register is 0x 2101.’ From where does the router boot?

A. ROM
B. NVRAM
C. FLASH
D. FTP Server

180. Which 3 pieces of CDP information about neighboring routers is displayed on your console terminal? (Choose three)

A. The neighboring router’s host protocol
B. The neighboring router’s hardware platform
C. Up to one address for each protocol supported
D. Up to two addresses for each protocol supported
E. As many addresses as are configured for each protocol supported

181. Which command retrieves the router configuring from NVRAM?

A. config NVRAM
B. copy NVRAM running-config
C. copy startup-config running-config
D. copy running-config startup config

182. Which two types of route table entries are used by a layer 3 router to determine the appropriate path to a destination? (Choose two)

A. Static route entry
B. Default route entry
C. Dynamic route entry
D. Temporary route entry
E. Permanent route entry


183. Which command loads the new version of the Cisco IOS into a router?

A. copy / STP
B. copy FTP/
C. copy / TFTP
D. copy TFTP/

184. In which three situations is a hold down timer reset? (Choose three)

A. When the hold down timer expires.
B. When infinity is finally defined as the sum of a maximum number.
C. When the router exchanges update summaries at area borders.
D. When the router detects faulty LSD’s propagating through the internetwork.
E. When another update is received indicating a new route with a better metric.
F. When another update is received indicating the original route to the network has been restored.
G. When the router receives a processing task proportional to the number of links in the internetwork.

185. After running the “version command” from a router, which of the following answers show the boot sequence that the router is using?

A. ROM: System Bootstrap, Version 4.14(9.1), SOFTWARE

B. Router uptime is 0 minutes
System restarted by power-on
System image file is "flash:c2500-d-l_120-9.BIN"

C. cisco 2500 (68030) processor (revision D) with 16384K/2048K bytes of memory.
Processor board ID 01729518, with hardware revision 00000000
Bridging software.
X.25 software, Version 3.0.0.
1 Ethernet/IEEE 802.3 interface(s)
2 Serial network interface(s)
32K bytes of non-volatile configuration memory.
8192K bytes of processor board System flash (Read ONLY)

D. Configuration register is 0x2102

186. During the start-up of a router, which of the following will show the configurable interfaces the router has?

A. System Bootstrap, Version 4.14(9.1), SOFTWARE
Copyright (c) 1986-1994 by cisco Systems
2500 processor with 16384 Kbytes of main memory
Loading c2500-d-l_120-9.BIN at 0x3000040, size = 6888660 bytes [OK]

B. Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-D-L), Version 12.0(9), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Mon 4-Jan-00 22:06 by bobl
Image text-base: 0x030387D0, data-base: 0x00001000

C. cisco 2500 (68030) processor (revision D) with 16384K/2048K bytes of memory.
Processor board ID 01729518, with hardware revision 00000000
Bridging software.
X.25 software, Version 3.0.0.
1 Ethernet/IEEE 802.3 interface(s)
2 Serial network interface(s)
32K bytes of non-volatile configuration memory.
8192K bytes of processor board System flash (Read ONLY)

187. Among the following; which answer shows the IOS version the router is using for boot-up?

A. System Bootstrap, Version 4.14(9.1), SOFTWARE
Copyright (c) 1986-1994 by cisco Systems
2500 processor with 16384 Kbytes of main memory
Loading c2500-d-l_120-9.BIN at 0x3000040, size = 6888660 bytes [OK]

B. Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-D-L), Version 12.0(9), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Mon 4-Jan-00 22:06 by bobl
Image text-base: 0x030387D0, data-base: 0x00001000


C. cisco 2500 (68030) processor (revision D) with 16384K/2048K bytes of memory.
Processor board ID 01729518, with hardware revision 00000000
Bridging software.
X.25 software, Version 3.0.0.
1 Ethernet/IEEE 802.3 interface(s)
2 Serial network interface(s)
32K bytes of non-volatile configuration memory.
8192K bytes of processor board System flash (Read ONLY)

188. Among the following; which one shows the flash revision the router is using and where it is being loaded in memory?

A. System Bootstrap, Version 4.14(9.1), SOFTWARE
Copyright (c) 1986-1994 by cisco Systems
2500 processor with 16384 Kbytes of main memory
Loading c2500-d-l_120-9.BIN at 0x3000040, size = 6888660 bytes [OK]

B. Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-D-L), Version 12.0(9), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Mon 4-Jan-00 22:06 by bobl
Image text-base: 0x030387D0, data-base: 0x00001000

C. cisco 2500 (68030) processor (revision D) with 16384K/2048K bytes of memory.
Processor board ID 01729518, with hardware revision 00000000
Bridging software.
X.25 software, Version 3.0.0.
1 Ethernet/IEEE 802.3 interface(s)
2 Serial network interface(s)
32K bytes of non-volatile configuration memory.
8192K bytes of processor board System flash (Read ONLY)

[email protected]
Average Member


United Arab Emirates
10 Posts
Posted - Dec 06 2001 :  04:13:36 AM  Show Profile  Reply with Quote
158. Which command assigns the login password 'cisco' on the console terminal line?

A. line vty 0
Log in
Password Cisco

B. Line console
Login
Password Cisco

C. Line login terminal
Password Cisco

D. Line console 0
Login
Password cisco

E. Line console 0
Login
Password CISCO

Answer: D. Line console 0
Login
Password cisco

161. IP RIP routing is configured on a router but not all interfaces are attached to RIP networks. What should you use to prevent all RIP routing updates from being sent through selected interfaces without using access lists?

A. Passive route
B. Default route
C. Passive interface
D. Route update filtering

Answer: C. Passive interface

162. Which part of LAN segmentation device enables high-speed data exchange?

A. A hub
B. A bridge
C. A switch
E. A repeater

Answer: C. A switch


163. What is the disadvantage of using connection-oriented protocols such as TCP?

A. Packet acknowledgement may add overhead.
B. Packets are not tagged with sequence numbers.
C. Loss of duplication of data packets is most likely to occur.
D. The application layer must assume responsibility for correct sequencing of the data packets.

Answer: A. Packet acknowledgement may add overhead.

164. What is an advantage of Local Area Network (LAN) segmentation?

A. Smaller collision domains
B. Elimination of broadcasts
C. Decreased cost of implementation
D. Larger number of users within the same domain

Answer: A. Smaller collision domains

165. What are two ways IPX supports multiple logical networks on an individual interface? (Choose two)

A. Network number
B. Routing protocol
C. Encapsulation type
D. Autonomous system number

Answer: A. Network number
C. Encapsulation type

166. Which two statements about a bridge are true? (Choose two)

A. A bridge floods multicast
B. A bridge floods broadcast
C. A bridge does not flood multicast
D. A bridge does not flood broadcast

Answer: A. A bridge floods multicast
B. A bridge floods broadcast

167. What is not a characteristic of the network segment on a switch?

A. The segment has its own collision domain.
B. The segment can translate from one media to a different media.
C. All devices in the segment are part of the same broadcast domain.
D. One device per segment can concurrently send frames to the switch.

Answer: B. The segment can translate from one media to a different media.
D. One device per segment can concurrently send frames to the switch.

168. Which command displays the IP addresses applying to specific host names?

A. show host
B. show interface
C. ping host name
D. config host name
E. show host mapping
F. show host name IP address
G. trace IP addresses host name

Answer: A. show hosts

169. In which layer of the OSI model does the ping command operate?

A. Session
B. Network
C. Transport
D. Maintenance

Answer: B. Network

170. Which commands should you use to enable IGRP routing?

A. Router IGRP 100
network 192.168.1.0
network 10.0.0.0

B. Router IGRP 100
network 192.168.1.0
network 10.2.0.0

C. Router IGRP 100
network 192.168.1.0 192.168.1.1
network 10.2.0.0 10.2.1.1

D. Router IGRP 100
network 192.168.1.0 255.255.255.0
network 10.2.0.0 255.255.0.0

Answer: A. Router IGRP 100
network 192.168.1.0
network 10.0.0.0

171. Which element is used to define the rate in bits per second that a frame relay switch agrees to transfer data?

A. The clock rate (CR)
B. The committed information rate (CIR)
C. The local management interface (LMI)
D. The data link connection identifier (DLCI)
E. The committed rate measurement interval (CRMI)

Answer: B. The committed information rate (CIR)

172. Which command verifies encapsulation as well as layer-1 and layer-2 statistics on a router configured for frame relay?

A. show IP
B. show interface
C. show statistics
D. show frame-relay

Answer: B. show interface

173. Which configuration mode and command combination sets the bandwidth metric of a frame relay connection?

A. router (config)# clock rate 56
B. router (config-IF)# bandwidth 56
C. router (config)# bandwidth 56000
D. router (config)# clock rate 56000

Answer: B. router (config-IF)# bandwidth 56

174. Which router command allows you to view the entire contents of all access lists?

A. router # the command show interface
B. router > the command show IP interface
C. router # show access-list
D. router > show all access-list

Answer: C. router # show access-list

175. Which router command allows you to determine if an IP access list is enabled on a particular interface?

A. at the router # show IP interface
B. router > prompt show access-list
C. router # show IP access-list
D. router > show interface IP access-list

Answer: A. at the router # show IP interface

176. Which range of possible numbers do standard IP access-lists have?

A. 1 - 99
B. 600 - 699
C. 800 - 899
D. 1000 - 1099

Answer: A. 1 - 99

177. Given the configuration example:

Interface, Ethernet 0, IPX network, 4a
IPX access group 800 out
Interface Ethernet 1
IPX network 3d
Interface Ethernet 2
IPX network 5c
Access-list 800 permit 3d 4a

Which two actions result from implementing Ethernet in this configuration? (Choose two)

A. IPX network 5c will not receive any traffic.
B. Traffic from network 3d from 4a will be forwarded out e0.
C. Traffic from network 4a for network 3d will be forwarded out e0.
D. Traffic from network 3d destined for network 4a will be forwarded out of e2.
E. The access-list is applied to an outgoing interface and filters outbound traffic.

Answer: C. Traffic from network 4a for network 3d will be forwarded out e0.
E. The access-list is applied to an outgoing interface and filters outbound traffic.

178. Which two statements are true? (Choose two)

A. Ethernet 802.3 utilizes the half duplex method for data transfer
B. In a 100 megabit point-to-point connection a full duplex connection can provide 400 megabits of data transfer.
C. Ethernet switches can use the full duplex mode to connect multiple modes on a single port of a switch.
D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception.

Answer: A. Ethernet 802.3 utilizes the half duplex method for data transfer
D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception.

179. When you issue the command ‘Show Version,’ your router returns ‘Configuration registration register is 0x 2101.’ From where does the router boot?

A. ROM
B. NVRAM
C. FLASH
D. FTP Server

Answer: A. ROM

180. Which 3 pieces of CDP information about neighboring routers is displayed on your console terminal? (Choose three)

A. The neighboring router’s host protocol
B. The neighboring router’s hardware platform
C. Up to one address for each protocol supported
D. Up to two addresses for each protocol supported
E. As many addresses as are configured for each protocol supported

Answer: A. The neighboring router’s host protocol
B. The neighboring router’s hardware platform
E. As many addresses as are configured for each protocol supported

181. Which command retrieves the router configuring from NVRAM?

A. config NVRAM
B. copy NVRAM running-config
C. copy startup-config running-config
D. copy running-config startup config

Answer: C. copy startup-config running-config

182. Which two types of route table entries are used by a layer 3 router to determine the appropriate path to a destination? (Choose two)

A. Static route entry
B. Default route entry
C. Dynamic route entry
D. Temporary route entry
E. Permanent route entry

Answer: A. Static route entry
C. Dynamic route entry


183. Which command loads the new version of the Cisco IOS into a router?

A. copy / STP
B. copy FTP/
C. copy / TFTP
D. copy TFTP/

Answer: D. copy TFTP/

184. In which three situations is a hold down timer reset? (Choose three)

A. When the hold down timer expires.
B. When infinity is finally defined as the sum of a maximum number.
C. When the router exchanges update summaries at area borders.
D. When the router detects faulty LSD’s propagating through the internetwork.
E. When another update is received indicating a new route with a better metric.
F. When another update is received indicating the original route to the network has been restored.
G. When the router receives a processing task proportional to the number of links in the internetwork.

Answer: A. When the hold down timer expires.
F. When another update is received indicating the original route to the network has been restored.
G. When the router receives a processing task proportional to the number of links in the internetwork.

Go to Top of Page

[email protected]
Average Member


United Arab Emirates
10 Posts
Posted - Dec 06 2001 :  04:15:53 AM  Show Profile  Reply with Quote
158. Which command assigns the login password 'cisco' on the console terminal line?

A. line vty 0
Log in
Password Cisco

B. Line console
Login
Password Cisco

C. Line login terminal
Password Cisco

D. Line console 0
Login
Password cisco

E. Line console 0
Login
Password CISCO

Answer: D. Line console 0
Login
Password cisco

161. IP RIP routing is configured on a router but not all interfaces are attached to RIP networks. What should you use to prevent all RIP routing updates from being sent through selected interfaces without using access lists?

A. Passive route
B. Default route
C. Passive interface
D. Route update filtering

Answer: C. Passive interface

162. Which part of LAN segmentation device enables high-speed data exchange?

A. A hub
B. A bridge
C. A switch
E. A repeater

Answer: C. A switch


163. What is the disadvantage of using connection-oriented protocols such as TCP?

A. Packet acknowledgement may add overhead.
B. Packets are not tagged with sequence numbers.
C. Loss of duplication of data packets is most likely to occur.
D. The application layer must assume responsibility for correct sequencing of the data packets.

Answer: A. Packet acknowledgement may add overhead.

164. What is an advantage of Local Area Network (LAN) segmentation?

A. Smaller collision domains
B. Elimination of broadcasts
C. Decreased cost of implementation
D. Larger number of users within the same domain

Answer: A. Smaller collision domains

165. What are two ways IPX supports multiple logical networks on an individual interface? (Choose two)

A. Network number
B. Routing protocol
C. Encapsulation type
D. Autonomous system number

Answer: A. Network number
C. Encapsulation type

166. Which two statements about a bridge are true? (Choose two)

A. A bridge floods multicast
B. A bridge floods broadcast
C. A bridge does not flood multicast
D. A bridge does not flood broadcast

Answer: A. A bridge floods multicast
B. A bridge floods broadcast

167. What is not a characteristic of the network segment on a switch?

A. The segment has its own collision domain.
B. The segment can translate from one media to a different media.
C. All devices in the segment are part of the same broadcast domain.
D. One device per segment can concurrently send frames to the switch.

Answer: B. The segment can translate from one media to a different media.
D. One device per segment can concurrently send frames to the switch.

168. Which command displays the IP addresses applying to specific host names?

A. show host
B. show interface
C. ping host name
D. config host name
E. show host mapping
F. show host name IP address
G. trace IP addresses host name

Answer: A. show hosts

169. In which layer of the OSI model does the ping command operate?

A. Session
B. Network
C. Transport
D. Maintenance

Answer: B. Network

170. Which commands should you use to enable IGRP routing?

A. Router IGRP 100
network 192.168.1.0
network 10.0.0.0

B. Router IGRP 100
network 192.168.1.0
network 10.2.0.0

C. Router IGRP 100
network 192.168.1.0 192.168.1.1
network 10.2.0.0 10.2.1.1

D. Router IGRP 100
network 192.168.1.0 255.255.255.0
network 10.2.0.0 255.255.0.0

Answer: A. Router IGRP 100
network 192.168.1.0
network 10.0.0.0

171. Which element is used to define the rate in bits per second that a frame relay switch agrees to transfer data?

A. The clock rate (CR)
B. The committed information rate (CIR)
C. The local management interface (LMI)
D. The data link connection identifier (DLCI)
E. The committed rate measurement interval (CRMI)

Answer: B. The committed information rate (CIR)

172. Which command verifies encapsulation as well as layer-1 and layer-2 statistics on a router configured for frame relay?

A. show IP
B. show interface
C. show statistics
D. show frame-relay

Answer: B. show interface

173. Which configuration mode and command combination sets the bandwidth metric of a frame relay connection?

A. router (config)# clock rate 56
B. router (config-IF)# bandwidth 56
C. router (config)# bandwidth 56000
D. router (config)# clock rate 56000

Answer: B. router (config-IF)# bandwidth 56

174. Which router command allows you to view the entire contents of all access lists?

A. router # the command show interface
B. router > the command show IP interface
C. router # show access-list
D. router > show all access-list

Answer: C. router # show access-list

175. Which router command allows you to determine if an IP access list is enabled on a particular interface?

A. at the router # show IP interface
B. router > prompt show access-list
C. router # show IP access-list
D. router > show interface IP access-list

Answer: A. at the router # show IP interface

176. Which range of possible numbers do standard IP access-lists have?

A. 1 - 99
B. 600 - 699
C. 800 - 899
D. 1000 - 1099

Answer: A. 1 - 99

177. Given the configuration example:

Interface, Ethernet 0, IPX network, 4a
IPX access group 800 out
Interface Ethernet 1
IPX network 3d
Interface Ethernet 2
IPX network 5c
Access-list 800 permit 3d 4a

Which two actions result from implementing Ethernet in this configuration? (Choose two)

A. IPX network 5c will not receive any traffic.
B. Traffic from network 3d from 4a will be forwarded out e0.
C. Traffic from network 4a for network 3d will be forwarded out e0.
D. Traffic from network 3d destined for network 4a will be forwarded out of e2.
E. The access-list is applied to an outgoing interface and filters outbound traffic.

Answer: C. Traffic from network 4a for network 3d will be forwarded out e0.
E. The access-list is applied to an outgoing interface and filters outbound traffic.

178. Which two statements are true? (Choose two)

A. Ethernet 802.3 utilizes the half duplex method for data transfer
B. In a 100 megabit point-to-point connection a full duplex connection can provide 400 megabits of data transfer.
C. Ethernet switches can use the full duplex mode to connect multiple modes on a single port of a switch.
D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception.

Answer: A. Ethernet 802.3 utilizes the half duplex method for data transfer
D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception.

179. When you issue the command ‘Show Version,’ your router returns ‘Configuration registration register is 0x 2101.’ From where does the router boot?

A. ROM
B. NVRAM
C. FLASH
D. FTP Server

Answer: A. ROM

180. Which 3 pieces of CDP information about neighboring routers is displayed on your console terminal? (Choose three)

A. The neighboring router’s host protocol
B. The neighboring router’s hardware platform
C. Up to one address for each protocol supported
D. Up to two addresses for each protocol supported
E. As many addresses as are configured for each protocol supported

Answer: A. The neighboring router’s host protocol
B. The neighboring router’s hardware platform
E. As many addresses as are configured for each protocol supported

181. Which command retrieves the router configuring from NVRAM?

A. config NVRAM
B. copy NVRAM running-config
C. copy startup-config running-config
D. copy running-config startup config

Answer: C. copy startup-config running-config

182. Which two types of route table entries are used by a layer 3 router to determine the appropriate path to a destination? (Choose two)

A. Static route entry
B. Default route entry
C. Dynamic route entry
D. Temporary route entry
E. Permanent route entry

Answer: A. Static route entry
C. Dynamic route entry


183. Which command loads the new version of the Cisco IOS into a router?

A. copy / STP
B. copy FTP/
C. copy / TFTP
D. copy TFTP/

Answer: D. copy TFTP/

184. In which three situations is a hold down timer reset? (Choose three)

A. When the hold down timer expires.
B. When infinity is finally defined as the sum of a maximum number.
C. When the router exchanges update summaries at area borders.
D. When the router detects faulty LSD’s propagating through the internetwork.
E. When another update is received indicating a new route with a better metric.
F. When another update is received indicating the original route to the network has been restored.
G. When the router receives a processing task proportional to the number of links in the internetwork.

Answer: A. When the hold down timer expires.
F. When another update is received indicating the original route to the network has been restored.
G. When the router receives a processing task proportional to the number of links in the internetwork.

Go to Top of Page

[email protected]
Junior Member



5 Posts
Posted - Dec 07 2001 :  3:52:55 PM  Show Profile  Reply with Quote
Read the damn book those are easy questions. Word of advice! If you think you can pass the CCNA without reading a book or hands on time your sadly mistaken. Those keen questions are only 60% of the test and a 60 is not a passing score. Bet your one of those paper MCSE's

Go to Top of Page

[email protected]
Advanced Member



56 Posts
Posted - Dec 11 2001 :  08:33:04 AM  Show Profile  Reply with Quote
heh.

Go to Top of Page

[email protected]
Junior Member



5 Posts
Posted - Dec 12 2001 :  2:19:15 PM  Show Profile  Reply with Quote
[quote]
heh.


What the hell is "heh" Dont you have anything intelligent to say

Go to Top of Page

[email protected]
Advanced Member



56 Posts
Posted - Dec 12 2001 :  11:03:20 PM  Show Profile  Reply with Quote
heh. Don't try to be a comedian. I don't need to say anything intelligent. Ask people in this forum about my help. You'll see what intelligent means. Later script-kiddie!

Go to Top of Page

[email protected]
Average Member


United Arab Emirates
10 Posts
Posted - Dec 13 2001 :  03:38:11 AM  Show Profile  Reply with Quote
Requesting and answering a question does not do any harm. Those above mentioned questions are not in the actual exam. Though one furious guy commented that its 60% already ????? What a joker? Anyone who has taken the CCNA exam would know what is the actual exam. CCNA exams are tough because the way the questions and answers to it are worded in such fashion to gage that the person who is taking the exam really knew the technology. There's one saying though, if you can't say something good, better keep silent!Go to Top of Page
[email protected]
Average Member



14 Posts
Posted - Dec 13 2001 :  4:16:35 PM  Show Profile  Reply with Quote
I've taken the CCNA and sadly enough, many of those questions are in the real exam.

Go to Top of Page

[email protected]
New Member



1 Posts
Posted - Jan 03 2002 :  2:15:44 PM  Show Profile  Reply with Quote
Hi all and Jreleo, just a newbie with a question to ask. Isn't an IPX standard list written as : access-list 800 ( source address ) ( destination address). If that is true , should the answer be B in that it is filtering traffic from network 3D and not 4A.

177. Given the configuration example:

Interface, Ethernet 0, IPX network, 4a
IPX access group 800 out
Interface Ethernet 1
IPX network 3d
Interface Ethernet 2
IPX network 5c
Access-list 800 permit 3d 4a

Which two actions result from implementing Ethernet in this configuration? (Choose two)

A. IPX network 5c will not receive any traffic.
B. Traffic from network 3d from 4a will be forwarded out e0.
C. Traffic from network 4a for network 3d will be forwarded out e0.
D. Traffic from network 3d destined for network 4a will be forwarded out of e2.
E. The access-list is applied to an outgoing interface and filters outbound traffic.

Answer: C. Traffic from network 4a for network 3d will be forwarded out e0.
E. The access-list is applied to an outgoing interface and filters outbound traffic.

Go to Top of Page

[email protected]
Junior Member



4 Posts
Posted - May 12 2002 :  12:25:18 AM  Show Profile  Reply with Quote

can you post the other questions which were not here..........

thanks,
redhat

Go to Top of Page

   
 New Topic  Reply to Topic
 Printer Friendly
Jump To:

Networkdesigner.net Forums

© 1999 - 2002 Networkdesigner.net

Go To Top Of Page
Snitz Forums 2000

| Free Practice Tests | TopSites | Advertisers | Contact | Terms | Privacy Policy |

Disclaimer

The material on this web site is not sponsored by, endorsed by or affiliated with Cisco Systems, Inc. CISCO® is a registered trademark of Cisco Systems, Inc.; CCNA™, CCDA™, CCNP™, CCDP™, CCIE™, CISCO CERTIFIED NETWORK ASSOCIATE™, CISCO CERTIFIED DESIGN ASSOCIATE™, CISCO CERTIFIED NETWORK PROFESSIONAL™, CISCO CERTIFIED DESIGN PROFESSIONAL™, CISCO CERTIFIED INTERNETWORK EXPERT™ are distinctive trademarks used by Cisco to describe its certifications and examinations in the United States and certain other countries. All other trademarks are trademarks of their respective owners.

Questions, comments? Email the . Copyright © 1999, 2000, 2001  Network Designer.  All rights reserved. study guides, practice tests, and/or material is copyright material and may not be redistributed in any way unless otherwise stated and is not sponsored by, endorsed by or affiliated with Cisco© Systems, Inc or any other company.   All trademarks are trademarks of their respective owners.