0

CISCO CCNA Quiz

Description: CISCO CCNA Quiz
Number of Questions: 15
Created by:
Tags: ccna cisco
Attempted 0/15 Correct 0 Score 0

Which command would prevent TFTP from address 172.16.16.16 to go through the Ethernet 0 interface 192.32.16.7?

  1. access-list 1 deny 192.32.16.7

  2. access-list 101 deny host 172.16.16.16 1 host 192.32.16.7 eq 69

  3. access-list 1 deny ip host 172.16.16.16 1 host 192.32.16.7 eq 69

  4. access-list 1 deny 172.16.16.16

  5. can't be done because it's TFTP


Correct Option: D
  1. the source address will change and the destination address will change

  2. change to reflect the current source and destination

  3. remain the same

  4. the source address will remain the same but the destination address will change

  5. none of the above


Correct Option: B
Explanation:

To solve this question, the user needs to know about MAC addresses and how they work in a routed network.

MAC addresses are unique identifiers assigned to network interfaces by the manufacturer. Each MAC address is assigned to a specific device, and it is used to identify that device on a network.

In a routed network, packets are sent from one network to another through intermediate devices such as routers. As a packet travels through the network, the MAC address of the source and destination will change depending on the device it is passing through.

Now let's go through each option and explain why it is right or wrong:

A. The source address will change and the destination address will change: This option is incorrect because the source and destination MAC addresses will not always change. They may change as the packet passes through different devices in the network, but they may also remain the same in certain cases.

B. Change to reflect the current source and destination: This option is partially correct. The MAC address of the packet will change as it passes through different devices in the network. However, it is not changing to reflect the current source and destination, but rather to identify the device the packet is currently passing through.

C. Remain the same: This option is incorrect. While it is possible for the MAC address to remain the same in certain cases, it is not always the case.

D. The source address will remain the same but the destination address will change: This option is also partially correct. The source MAC address will not change, but the destination MAC address will change as the packet passes through different devices in the network.

E. None of the above: This option is incorrect because options B and D are partially correct.

Therefore, the correct answer is:

The Answer is: B or D (both are partially correct)

  1. The source of commonly used configuration commands

  2. The primary source of the Cisco IOS

  3. A location to run the active configuration from

  4. A location to run the power on diagnostics from

  5. A location to store a backup copy of the router configuration file


Correct Option: E
  1. By manually entering setup mode from the system load prompt

  2. By manually entering setup mode from the configuration load prompt

  3. If no configuration file can be found

  4. If the present configuration file is older than the one attempting to load

  5. By manually entering setup mode from the user prompt


Correct Option: C
  1. NVRAM, TFTP Server, ROM

  2. NVRAM, TFTP Server, RAM

  3. TFTP Server, FTP Server, ROM

  4. Flash memory, TFTP Server, ROM

  5. NVRAM, Flash memory


Correct Option: D
  1. The address of the nearest downstream neighbor in a Token ring network.

  2. At the router, it is the route used to direct frames for which the next hop has not been explicitly listed in the routing table.

  3. Any static route listing in a routing table.

  4. This is the route that will be chosen first by IP for delivery of a datagram.

  5. When all conditions are equal, the best route for delivery of IP datagrams.


Correct Option: B

The metric used by IPX RIP is:

  1. Ticks

  2. Hops

  3. Cost

  4. Tips and Hops


Correct Option: D

The Catalyst 5000 uses which switching mode?

  1. Cut-through

  2. Store and forward

  3. Fast switching


Correct Option: B

Source-route bridging occurs primarily in _______ environments.

  1. Token Ring

  2. Ethernet

  3. Switched Circuit

  4. None of the above


Correct Option: A

AI Explanation

To answer this question, you need to understand the concept of source-route bridging and its associated environments.

Source-route bridging is a networking technique that involves the use of predetermined routes (or paths) for data packets to travel from the source node to the destination node. These routes are determined and specified by the source node itself.

Now, let's go through each option to understand which environment primarily uses source-route bridging:

Option A) Token Ring - This option is correct because source-route bridging is primarily used in Token Ring environments. Token Ring is a networking standard that uses a token-passing mechanism to control access to the network. In Token Ring networks, source-route bridging is used to determine the path that data packets will take through the network.

Option B) Ethernet - This option is incorrect because source-route bridging is not commonly used in Ethernet environments. Ethernet networks typically use the Spanning Tree Protocol (STP) or other routing protocols to determine the best path for data packets.

Option C) Switched Circuit - This option is incorrect because source-route bridging is not commonly used in switched circuit environments. Switched circuit networks are typically used for dedicated connections, and the routing of data packets is usually determined by the switches in the network.

Option D) None of the above - This option is incorrect because source-route bridging does occur in Token Ring environments, as mentioned earlier.

Therefore, the correct answer is Option A) Token Ring. This option is correct because source-route bridging occurs primarily in Token Ring environments.

Which of the following statements is/are true about metrics used in routing protocols?

  1. A metric is the administrative distance of a routing protocol.

  2. A metric is a measure of trustworthiness and availability of a route.

  3. Both of the above

  4. none of the above


Correct Option: B

AI Explanation

To answer this question, we need to understand the concept of metrics in routing protocols.

Option A) A metric is the administrative distance of a routing protocol - This option is incorrect. The administrative distance is a concept used in routing to determine the preferability of routes from different routing protocols. It is not the same as a metric, which is a value used to measure the desirability of a route.

Option B) A metric is a measure of trustworthiness and availability of a route - This option is correct. In routing protocols, a metric is a value assigned to a route to represent its desirability. It can be based on various factors such as bandwidth, delay, reliability, or cost. A lower metric typically indicates a more preferred route.

Option C) Both of the above - This option is incorrect. Option A is incorrect, as explained above.

Option D) None of the above - This option is incorrect. Option B is correct, as explained above.

The correct answer is B. This option is correct because a metric in routing protocols is a measure of trustworthiness and availability of a route.

The process of address learning will happen in a switch only after the initial flooding of frames.

  1. True

  2. False


Correct Option: A

AI Explanation

To answer this question, we need to understand the process of address learning in a switch.

Address learning is the process by which a switch learns and associates MAC addresses with specific ports. When a switch receives a frame, it examines the source MAC address of the frame and associates it with the port from which the frame was received. This allows the switch to build a MAC address table, also known as a forwarding table or content-addressable memory (CAM) table.

Now, let's evaluate the given statement:

The process of address learning will happen in a switch only after the initial flooding of frames.

Option A) True - This option is correct. When a switch initially receives a frame, it does not know the location of the destination MAC address. Therefore, it floods the frame out of all ports, except the one it was received on. This flooding allows the switch to learn the source MAC addresses and associate them with the respective ports. After this initial flooding, the switch can perform address learning and update its MAC address table.

Option B) False - This option is incorrect. The address learning process in a switch occurs after the initial flooding of frames.

Therefore, the correct answer is A) True. This option is correct because the address learning process in a switch occurs only after the initial flooding of frames.

  1. Encryption

  2. Upper layer protocol

  3. Lower Layer protocol

  4. none of the above


Correct Option: B
- Hide questions