Tag: cisco-ccna

Questions Related to cisco-ccna

Which of the following keystrokes will move the cursor to the beginning of the previous word?

  1. Ctrl A

  2. Ctrl B

  3. Esc B

  4. Ctrl F

  5. Ctrl E


Correct Option: C

AI Explanation

To answer this question, we need to understand the different keystrokes and their functions.

Option A) Ctrl + A - This option will move the cursor to the beginning of the current line, not the previous word.

Option B) Ctrl + B - This option will move the cursor back one character at a time, not to the beginning of the previous word.

Option C) Esc + B - This option is correct. This keystroke combination will move the cursor to the beginning of the previous word.

Option D) Ctrl + F - This option will move the cursor forward one character at a time, not to the beginning of the previous word.

Option E) Ctrl + E - This option will move the cursor to the end of the current line, not the beginning of the previous word.

The correct answer is Option C) Esc + B. This option is correct because it will move the cursor to the beginning of the previous word.

Which command would prevent TFTP from address 172.16.16.16 to go through the Ethernet 0 interface 192.32.16.7?

  1. access-list 1 deny 192.32.16.7

  2. access-list 101 deny host 172.16.16.16 1 host 192.32.16.7 eq 69

  3. access-list 1 deny ip host 172.16.16.16 1 host 192.32.16.7 eq 69

  4. access-list 1 deny 172.16.16.16

  5. can't be done because it's TFTP


Correct Option: D
  1. the source address will change and the destination address will change

  2. change to reflect the current source and destination

  3. remain the same

  4. the source address will remain the same but the destination address will change

  5. none of the above


Correct Option: B
Explanation:

To solve this question, the user needs to know about MAC addresses and how they work in a routed network.

MAC addresses are unique identifiers assigned to network interfaces by the manufacturer. Each MAC address is assigned to a specific device, and it is used to identify that device on a network.

In a routed network, packets are sent from one network to another through intermediate devices such as routers. As a packet travels through the network, the MAC address of the source and destination will change depending on the device it is passing through.

Now let's go through each option and explain why it is right or wrong:

A. The source address will change and the destination address will change: This option is incorrect because the source and destination MAC addresses will not always change. They may change as the packet passes through different devices in the network, but they may also remain the same in certain cases.

B. Change to reflect the current source and destination: This option is partially correct. The MAC address of the packet will change as it passes through different devices in the network. However, it is not changing to reflect the current source and destination, but rather to identify the device the packet is currently passing through.

C. Remain the same: This option is incorrect. While it is possible for the MAC address to remain the same in certain cases, it is not always the case.

D. The source address will remain the same but the destination address will change: This option is also partially correct. The source MAC address will not change, but the destination MAC address will change as the packet passes through different devices in the network.

E. None of the above: This option is incorrect because options B and D are partially correct.

Therefore, the correct answer is:

The Answer is: B or D (both are partially correct)

  1. The source of commonly used configuration commands

  2. The primary source of the Cisco IOS

  3. A location to run the active configuration from

  4. A location to run the power on diagnostics from

  5. A location to store a backup copy of the router configuration file


Correct Option: E
  1. By manually entering setup mode from the system load prompt

  2. By manually entering setup mode from the configuration load prompt

  3. If no configuration file can be found

  4. If the present configuration file is older than the one attempting to load

  5. By manually entering setup mode from the user prompt


Correct Option: C

Which answer describes the possible locations from which the operating system would be loaded at system initialization?

  1. NVRAM, TFTP Server, ROM

  2. NVRAM, TFTP Server, RAM

  3. TFTP Server, FTP Server, ROM

  4. Flash memory, TFTP Server, ROM

  5. NVRAM, Flash memory


Correct Option: D

AI Explanation

To answer this question, we need to understand the possible locations from which the operating system can be loaded at system initialization.

Option A) NVRAM, TFTP Server, ROM - This option is incorrect because it does not include Flash memory as a possible location.

Option B) NVRAM, TFTP Server, RAM - This option is incorrect because it does not include Flash memory as a possible location.

Option C) TFTP Server, FTP Server, ROM - This option is incorrect because it does not include Flash memory or NVRAM as possible locations.

Option D) Flash memory, TFTP Server, ROM - This option is correct. The operating system can be loaded from Flash memory, which is a non-volatile memory that retains data even when power is removed. It can also be loaded from a TFTP (Trivial File Transfer Protocol) Server, which allows for remote loading of files. ROM (Read-Only Memory) is also a possible location.

Option E) NVRAM, Flash memory - This option is incorrect because it does not include ROM or TFTP Server as possible locations.

The correct answer is D. This option includes all the possible locations from which the operating system can be loaded at system initialization: Flash memory, TFTP Server, and ROM.

  1. The address of the nearest downstream neighbor in a Token ring network.

  2. At the router, it is the route used to direct frames for which the next hop has not been explicitly listed in the routing table.

  3. Any static route listing in a routing table.

  4. This is the route that will be chosen first by IP for delivery of a datagram.

  5. When all conditions are equal, the best route for delivery of IP datagrams.


Correct Option: B

The metric used by IPX RIP is:

  1. Ticks

  2. Hops

  3. Cost

  4. Tips and Hops


Correct Option: D

The Catalyst 5000 uses which switching mode?

  1. Cut-through

  2. Store and forward

  3. Fast switching


Correct Option: B