Tag: cisco-ccna

Questions Related to cisco-ccna

Which command would prevent TFTP from address 172.16.16.16 to go through the Ethernet 0 interface 192.32.16.7?

  1. access-list 1 deny 192.32.16.7

  2. access-list 101 deny host 172.16.16.16 1 host 192.32.16.7 eq 69

  3. access-list 1 deny ip host 172.16.16.16 1 host 192.32.16.7 eq 69

  4. access-list 1 deny 172.16.16.16

  5. can't be done because it's TFTP


Correct Option: D
  1. the source address will change and the destination address will change

  2. change to reflect the current source and destination

  3. remain the same

  4. the source address will remain the same but the destination address will change

  5. none of the above


Correct Option: B
Explanation:

To solve this question, the user needs to know about MAC addresses and how they work in a routed network.

MAC addresses are unique identifiers assigned to network interfaces by the manufacturer. Each MAC address is assigned to a specific device, and it is used to identify that device on a network.

In a routed network, packets are sent from one network to another through intermediate devices such as routers. As a packet travels through the network, the MAC address of the source and destination will change depending on the device it is passing through.

Now let's go through each option and explain why it is right or wrong:

A. The source address will change and the destination address will change: This option is incorrect because the source and destination MAC addresses will not always change. They may change as the packet passes through different devices in the network, but they may also remain the same in certain cases.

B. Change to reflect the current source and destination: This option is partially correct. The MAC address of the packet will change as it passes through different devices in the network. However, it is not changing to reflect the current source and destination, but rather to identify the device the packet is currently passing through.

C. Remain the same: This option is incorrect. While it is possible for the MAC address to remain the same in certain cases, it is not always the case.

D. The source address will remain the same but the destination address will change: This option is also partially correct. The source MAC address will not change, but the destination MAC address will change as the packet passes through different devices in the network.

E. None of the above: This option is incorrect because options B and D are partially correct.

Therefore, the correct answer is:

The Answer is: B or D (both are partially correct)

  1. The source of commonly used configuration commands

  2. The primary source of the Cisco IOS

  3. A location to run the active configuration from

  4. A location to run the power on diagnostics from

  5. A location to store a backup copy of the router configuration file


Correct Option: E

Under what conditions will a router enter setup mode?

  1. By manually entering setup mode from the system load prompt

  2. By manually entering setup mode from the configuration load prompt

  3. If no configuration file can be found

  4. If the present configuration file is older than the one attempting to load

  5. By manually entering setup mode from the user prompt


Correct Option: C

AI Explanation

To answer this question, let's go through each option to understand why it is correct or incorrect:

Option A) By manually entering setup mode from the system load prompt - This option is incorrect because entering setup mode from the system load prompt is not a condition for a router to enter setup mode. Setup mode is typically entered by using the "setup" command.

Option B) By manually entering setup mode from the configuration load prompt - This option is incorrect because entering setup mode from the configuration load prompt is not a condition for a router to enter setup mode. Setup mode is typically entered by using the "setup" command.

Option C) If no configuration file can be found - This option is correct. If a router cannot find a valid configuration file during the startup process, it will automatically enter setup mode to allow for initial configuration.

Option D) If the present configuration file is older than the one attempting to load - This option is incorrect. The age of the configuration file does not determine whether a router enters setup mode or not.

Option E) By manually entering setup mode from the user prompt - This option is incorrect because entering setup mode from the user prompt is not a condition for a router to enter setup mode. Setup mode is typically entered by using the "setup" command.

The correct answer is C) If no configuration file can be found. This option is correct because when a router cannot find a valid configuration file during the startup process, it will automatically enter setup mode to allow for initial configuration.

  1. NVRAM, TFTP Server, ROM

  2. NVRAM, TFTP Server, RAM

  3. TFTP Server, FTP Server, ROM

  4. Flash memory, TFTP Server, ROM

  5. NVRAM, Flash memory


Correct Option: D

Which of the following protocols is unacknowledged?

  1. SPX

  2. TCP

  3. Telnet

  4. UDP

  5. FTP


Correct Option: D

AI Explanation

To answer this question, you need to understand the concept of acknowledged and unacknowledged protocols.

Acknowledged protocols are network protocols that require the receiving device to send an acknowledgment back to the sender to confirm that the data has been received successfully. On the other hand, unacknowledged protocols do not require an acknowledgment to be sent back to the sender.

Let's go through each option to understand which protocol is unacknowledged:

Option A) SPX - SPX (Sequenced Packet Exchange) is a transport-layer protocol used by Novell NetWare. It is an acknowledged protocol, as it requires the receiver to send acknowledgments back to the sender. Therefore, this option is incorrect.

Option B) TCP - TCP (Transmission Control Protocol) is a widely used transport-layer protocol in computer networks. TCP is an acknowledged protocol, as it provides reliable, connection-oriented communication with acknowledgments. Therefore, this option is incorrect.

Option C) Telnet - Telnet is a network protocol used for remote access to servers or devices. It is an acknowledged protocol, as it requires the receiver to send acknowledgments back to the sender. Therefore, this option is incorrect.

Option D) UDP - UDP (User Datagram Protocol) is an example of an unacknowledged protocol. It is a lightweight transport-layer protocol that does not provide reliability or acknowledgments. UDP is often used for applications where speed and efficiency are more important than guaranteed delivery, such as streaming media or real-time communication. Therefore, this option is correct.

Option E) FTP - FTP (File Transfer Protocol) is a network protocol used for transferring files between a client and a server. FTP uses TCP as its transport protocol, which is an acknowledged protocol. Therefore, this option is incorrect.

The correct answer is Option D) UDP. UDP is an unacknowledged protocol that does not require the receiver to send acknowledgments back to the sender.

What is the default route on an IP network?

  1. The address of the nearest downstream neighbor in a Token ring network.

  2. At the router, it is the route used to direct frames for which the next hop has not been explicitly listed in the routing table.

  3. Any static route listing in a routing table.

  4. This is the route that will be chosen first by IP for delivery of a datagram.

  5. When all conditions are equal, the best route for delivery of IP datagrams.


Correct Option: B

The metric used by IPX RIP is:

  1. Ticks

  2. Hops

  3. Cost

  4. Tips and Hops


Correct Option: D

The Catalyst 5000 uses which switching mode?

  1. Cut-through

  2. Store and forward

  3. Fast switching


Correct Option: B