1. What is the class B private IP address range?

 
 
 
 

2. Where is the Cisco IOS stored by default?

 
 
 
 

3. What is the range of a numbered standard access-list? (Choose two)

 
 
 
 
 

4. Which description describes a global unicast address?

 
 
 

5. What type of UTP cable can you use to connect a switch to another switch?

 
 
 
 

6. Which of the following is true regarding access-lists applied to an interface?

 
 
 
 

7. Where are the routing tables stored by default?

 
 
 
 

8. Which host(s) have priority after the expiration of the backoff algorithm?

 
 
 
 

9. Which of the following is a L2 protocol used to maintain a loop-free network?

 
 
 
 

10. Which of the following protocols provide network redundancy for IP networks? (Choose two)

 
 
 
 

11. What type of UTP cable can you use to connect a router to another router?

 
 
 
 

12. In which of the following network types will there be a DR and BDR election? (Choose two)

 
 
 
 

13. Which of the following  are not PPP Data-link protocols?

 
 
 
 
 

14. At which layer of the OSI model does SNMP operate?

 
 
 
 

15. Which of the following are PPP authentication methods? (Choose two)

 
 
 
 
 

16. Which layer is represented by packets?

 
 
 
 

17. In a network using EIGRP as routing protocol, all routes in the topology table are in an active state, what does this mean?

 
 
 

18. What is the default subnetmask of a class A address?

 
 
 

19. Which routing protocol uses multicast address FF02::5 and FF02::6?

 
 
 

20. Full-duplex doubles the speed of the cable.

 
 

21. Which of the following features are in SNMPv3 and in SNMPv2? (Choose two)

 
 
 
 
 

22. What multicast addresses are used by OSPF? (Choose two)

 
 
 
 

23. What commands have to be used on your router interfaces before NAT will translate addresses? (Choose two)

 
 
 
 

24. Which of the following routed protocols does EIGRP support? (Choose two)

 
 
 
 

25. What type of UTP cable can you use to connect a PC directly to a router?

 
 
 
 

26. Which switch will become the root bridge?

 
 
 
 

27. What command would you use to copy a Cisco IOS to a TFTP server?

 
 
 
 
 

28. The feasible successor is the route with the lowest distance to the remote network.

 
 

29. Which of the following describes a private network accross the internet?

 
 
 
 

30. What command would you use to set a console password of “Stevit”?

 
 
 
 

31. In a network using EIGRP as routing protocol, all routes in the topology table are in a passive state, what does this mean?

 
 
 

32. What does the violation protect do on a switchport?

 
 
 

33. What address of a frame does the switch put in its CAM table?

 
 
 
 

34. What command should you use to see which side is the DCE side of a serial connection?

 
 
 
 
 

35. What command would you use to save the running-config to NVRAM?

 
 
 
 

36. What is IARP used for?

 
 
 
 

37. What can you use to create a static route? (Choose two)

 
 
 
 

38. What will OSPF use to choose the DR and BDR when all routers have the same OSPF priority?

 
 
 

39. Which of the following are public IP addresses? (Choose two)

 
 
 
 

40. At which layer of the OSI model does FTP operate?

 
 
 
 

41. What metric does OSPF use?

 
 
 
 

42. A network engineer at Stevit wants to block telnet with a standard numbered access-list, what command should the network engineer use to apply the access-list?

 
 
 
 

43. What is an advantage of static routing?

 
 
 

44. Where is the ARP cache stored by default?

 
 
 
 

45. Which of the following AD will make it to the routing table?

 
 
 
 
 

46. Which of the following has an AD of 0? (Choose two)

 
 
 
 

47. The feasible successor will be in the topology table.

 
 

48. Which of the following protocols is used for trunking on a switch? (Choose two)

 
 
 
 

49. Which of the following are public IP address? (Choose two)

 
 
 
 

50. When using PPP authentication, you have to use the hostname of the remote router.

 
 

Question 1 of 50