DRAFT CCNA TEST QUESTIONS AND
ANSWERS
What 2 ICMPv6 message types must be permitted through IPv6 access control lists to
allow resolution of Layer 3 to Layer 2 MAC addresses? - Correct Answers -1.Neighbor
solicitations
2.Neighbor advertisements
What is the range of link-local addresses can be assigned to an IPv6-enabled interface?
- Correct Answers -FE80::/10
When a switch configuration includes a user-defined error threshold on a per-port basis,
to which switching method will the switch revert when the error threshold is reached? -
Correct Answers -Store and forward
What are two characteristics of IP? (Choose two.)
IP is connectionless - best effort - Correct Answers -1. does not require a dedicated
end-to-end connection
operates 2. independently of the network media
An employee of a large corporation remotely logs into the company using the
appropriate username and password. The employee is attending an important video
conference with a customer concerning a large sale. It is important for the video quality
to be excellent during the meeting. The employee is unaware that after a successful
login, the connection to the company ISP failed. The secondary connection, however,
activated within seconds. The disruption was not noticed by the employee or other
employees. What three network characteristics are described in this scenario? (Choose
three.) - Correct Answers -1. security
2. quality of service
3. fault tolerance
What are two common causes of signal degradation when using UTP cabling? (Choose
two.)
1.improper termination
2.low-quality shielding in cable
3.installing cables in conduit
4.low-quality cable or connectors
, 5.loss of light over long distances - Correct Answers -1. Improper termination
2. Low quality cable or connectors
Which two statements are correct about MAC and IP addresses during data
transmission if NAT is not involved? (Choose two.) - Correct Answers -1. Destination IP
addresses in a packet header remain constant along the entire path to a target host.
2. Destination and source MAC addresses have local significance and change every
time a frame goes from one LAN to another.
What is one main characteristic of the data link layer? - Correct Answers -It shields the
upper layer protocol from being aware of the physical medium to be used in the
communication.
What are three characteristics of the CSMA/CD process? (Choose three.) - Correct
Answers -1.A device listens and waits until the media is not busy before transmitting.
2. After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
3. All of the devices on a segment see data that passes on the network medium.
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) -
Correct Answers -1. accessing the media
2. data encapsulation
Which two commands can be used on a Windows host to display the routing table?
(Choose two.) - Correct Answers -route print
netstat -r
What are two functions that are provided by the network layer? (Choose two.) - Correct
Answers -1. directing data packets to destination hosts on other networks
2. providing end devices with a unique network identifier
Which two statements describe features of an IPv4 routing table on a router? (Choose
two.) - Correct Answers -1. Directly connected interfaces will have two route source
codes in the routing table: C and S.
2. If a default static route is configured in the router, an entry will be included in the
routing table with source code S.
How does the service password-encryption command enhance password security on
Cisco routers and switches? - Correct Answers -It encrypts passwords that are stored in
router or switch configuration files.
ANSWERS
What 2 ICMPv6 message types must be permitted through IPv6 access control lists to
allow resolution of Layer 3 to Layer 2 MAC addresses? - Correct Answers -1.Neighbor
solicitations
2.Neighbor advertisements
What is the range of link-local addresses can be assigned to an IPv6-enabled interface?
- Correct Answers -FE80::/10
When a switch configuration includes a user-defined error threshold on a per-port basis,
to which switching method will the switch revert when the error threshold is reached? -
Correct Answers -Store and forward
What are two characteristics of IP? (Choose two.)
IP is connectionless - best effort - Correct Answers -1. does not require a dedicated
end-to-end connection
operates 2. independently of the network media
An employee of a large corporation remotely logs into the company using the
appropriate username and password. The employee is attending an important video
conference with a customer concerning a large sale. It is important for the video quality
to be excellent during the meeting. The employee is unaware that after a successful
login, the connection to the company ISP failed. The secondary connection, however,
activated within seconds. The disruption was not noticed by the employee or other
employees. What three network characteristics are described in this scenario? (Choose
three.) - Correct Answers -1. security
2. quality of service
3. fault tolerance
What are two common causes of signal degradation when using UTP cabling? (Choose
two.)
1.improper termination
2.low-quality shielding in cable
3.installing cables in conduit
4.low-quality cable or connectors
, 5.loss of light over long distances - Correct Answers -1. Improper termination
2. Low quality cable or connectors
Which two statements are correct about MAC and IP addresses during data
transmission if NAT is not involved? (Choose two.) - Correct Answers -1. Destination IP
addresses in a packet header remain constant along the entire path to a target host.
2. Destination and source MAC addresses have local significance and change every
time a frame goes from one LAN to another.
What is one main characteristic of the data link layer? - Correct Answers -It shields the
upper layer protocol from being aware of the physical medium to be used in the
communication.
What are three characteristics of the CSMA/CD process? (Choose three.) - Correct
Answers -1.A device listens and waits until the media is not busy before transmitting.
2. After detecting a collision, hosts can attempt to resume transmission after a random
time delay has expired.
3. All of the devices on a segment see data that passes on the network medium.
What are two primary responsibilities of the Ethernet MAC sublayer? (Choose two.) -
Correct Answers -1. accessing the media
2. data encapsulation
Which two commands can be used on a Windows host to display the routing table?
(Choose two.) - Correct Answers -route print
netstat -r
What are two functions that are provided by the network layer? (Choose two.) - Correct
Answers -1. directing data packets to destination hosts on other networks
2. providing end devices with a unique network identifier
Which two statements describe features of an IPv4 routing table on a router? (Choose
two.) - Correct Answers -1. Directly connected interfaces will have two route source
codes in the routing table: C and S.
2. If a default static route is configured in the router, an entry will be included in the
routing table with source code S.
How does the service password-encryption command enhance password security on
Cisco routers and switches? - Correct Answers -It encrypts passwords that are stored in
router or switch configuration files.