| Other CCNA Interview Questions |
|| Asked @
|Identify the command to configure the router to boot from an IOS
located on a TFTP server?
A.) boot system tftp IOS.exe 172.16.5.1
B.) boot system tftp 172.16.5.1 IOS.exe
C.) boot system flash tftp 172.16.5.1
D.) boot system IOS.exe 172.16.5.1
|Extended IP access-lists (100-199) can be used to control
Which command listed below will permit smtp mail to only
host 184.108.40.206 ?
A.) It is not possible for SMTP traffic
B.) access-list 102 permit tcp any host 220.127.116.11 eq smtp
C.) access-list 101 permit tcp any 18.104.22.168 0.0.0.0 eq 23
D.) access-list 102 permit tcp any any eq smtp
E.) access-list 101 permit tcp any 22.214.171.124 0.0.0.0 eq 25
|What does the "IPX maximum-paths 2" command accomplish?
A. It enables load sharing on 2 paths if the paths are equal
B. It sets up routing to go to network 2.
C. It is the default for Cisco IPX load sharing.
D. It enables load sharing on 2 paths if the paths are
unequal metric paths.
|Identify the purpose of the Ping command?
A.) Share routing information with a neighbor router
B.) Transmit user data when buffers are full
C.) Test connectivity at layer 3
D.) Test entire protocol stack
|Which of the following are Distance Vector protocols?
|Which command should you use to create an IP standard access
A. access-list standard 172.16.4.13
B. access-list 1 deny 172.16.4.13 0.0.0.0
C. access-list 100 deny 172.16.4.13 0.0.0.0
D. access-list 198 deny 172.16.4.13 255.255.255.255
|If i connect two routers through ethernet cable and serial
cable then which has high speed and which is better among
|Based upon the 1st octet rule identify the range for a Class A
A.) 1 - 126
B.) 192 - 223
C.) 128 - 191
D.) 1 - 191
|Put the following steps of encapsulation into the correct order:
1) The data is broken into segments to be organized
2) Frames are converted to 1s and 0s to be put on the wire
3) Packets are converted into frames
4) Information that users enter is converted into data
5) The segments are changed to packets to be routed
A.) 4, 1, 3, 2, 5
B.) 4, 5, 1, 3, 2
C.) 2, 3, 1, 4, 5
D.) 4, 1, 5, 3, 2
|On a network design project you determine that a new testing
application requires multiple hosts. These hosts must be
capable of sharing data between each host and an enterprise
server at 10 Mobs bandwidth. Other divisions in the company
use applications that require less than 2 Mobs bandwidth of
the enterprise server. What is your most economical
A. That existing 10BaseT hubs be replaced with 1 00BaseT
hubs to improve overall performance
B. That a router can separate the testing application from
the rest of the network, thus allowing the testing
application more bandwidth.
C. That a switch be installed, so that the enterprise server
can be provided a 100 Mobs pod and each of the testing
application hosts can be given dedicated 10 Mobs pods]
D. That a bridge be placed between the enterprise server and
all other users with the exception of the testing application
|Write out a config to permit only the below MAC address
to pass traffic through a port on your switch.
|Identify 3 methods used to prevent routing loops?
A.) Split horizon
B.) Holddown timers
C.) Poison reverse
D.) SPF algorithm
|For more CCNA Interview Questions Click Here |