CCNA Questions
CCNA Questions
CCNA Questions
A. 0000.0C07.AC01
B. 0000.5E00.0110
C. 0007.B400.1203
D. 0000.C007.0201
Answer: A
Explanation
With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IP
address. There are two version of HSRP.
+ With HSRP version 1, the virtual routers MAC address is 0000.0c07.ACxx , in which xx is the HSRP
group.
+ With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the HSRP group.
Note: Another case is HSRP for IPv6, in which the MAC address range from 0005.73A0.0000 through
0005.73A0.0FFF.
-> A is correct.
Question 2: Which three statements about HSRP operation are true? (Choose three)
A. The virtual IP address and virtual MAC address are active on the HSRP Master router.
B. The HSRP default timers are a 3 second hello interval and a 10 second dead interval.
C. HSRP supports only clear-text authentication.
D. The HSRP virtual IP address must be on a different subnet than the routers interfaces on the same LAN.
E. The HSRP virtual IP address must be the same as one of the routers interface addresses on the LAN.
F. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.
Answer: A B F
Explanation
The virtual MAC address of HSRP version 1 is 0000.0C07.ACxx, where xx is the HSRP group number in
hexadecimal based on the respective interface. For example, HSRP group 10 uses the HSRP virtual MAC
address of 0000.0C07.AC0A. HSRP version 2 uses a virtual MAC address of 0000.0C9F.FXXX (XXX:
HSRP group in hexadecimal)
Answer: B
Explanation
Object tracking is the process of tracking the state of a configured object and uses that state to determine the
priority of the VRRP router in a VRRP group -> B is correct.
Note: Unlike HSRP which can track interface status directly, VRRP can only track interface status through a
tracked object.
A. The active virtual gateway will reply with one of four possible virtual MAC addresses.
B. All GLBP member routers will reply in round-robin fashion.
C. The active virtual gateway will reply with its own hardware MAC address.
D. The GLBP member routers will reply with one of four possible burned in hardware addresses.
Answer: A
Explanation
One disadvantage of HSRP and VRRP is that only one router is in use, other routers must wait for the primary
to fail because they can be used. However, Gateway Load Balancing Protocol (GLBP) can use of up to four
routers simultaneously. In GLBP, there is still only one virtual IP address but each router has a different
virtual MAC address. First a GLBP group must elect an Active Virtual Gateway (AVG). The AVG is
responsible for replying ARP requests from hosts/clients. It replies with different virtual MAC addresses that
correspond to different routers (known as Active Virtual Forwarders AVFs) so that clients can send traffic to
different routers in that GLBP group (load sharing).
A. AVF
B. AVG
C. Active Router
D. Standby Router
Answer: B
Answer: B D E
New CCNA SNMP Questions
Question 1: Which three are the components of SNMP? (Choose three)
A. MIB
B. SNMP Manager
C. SysLog Server
D. SNMP Agent
Answer: A B D
Explanation
SNMP is an application-layer protocol that provides a message format for communication between SNMP
managers and agents. SNMP provides a standardized framework and a common language used for the
monitoring and management of devices in a network.
The SNMP framework has three parts:
+ An SNMP manager
+ An SNMP agent
+ A Management Information Base (MIB)
The SNMP manager is the system used to control and monitor the activities of network hosts using SNMP.
The most common managing system is called a Network Management System (NMS). The term NMS can be
applied to either a dedicated device used for network management, or the applications used on such a device.
A variety of network management applications are available for use with SNMP. These features range from
simple command-line applications to feature-rich graphical user interfaces (such as the CiscoWorks2000 line
of products).
The SNMP agent is the software component within the managed device that maintains the data for the device
and reports these data, as needed, to managing systems. The agent and MIB reside on the routing device
(router, access server, or switch). To enable the SNMP agent on a Cisco routing device, you must define the
relationship between the manager and the agent.
The Management Information Base (MIB) is a virtual information storage area for network management
information, which consists of collections of managed objects.
A. Netflow
B. WCCP
C. IP SLA
D. SNMP
Answer: D
Explanation
They mean that the SNMP agent on the device has taken too much time to process a request.
You can determine the cause of high CPU use in a router by using the output of the show process cpu
command.
Note: A managed device is a part of the network that requires some form of monitoring and management
(routers, switches, servers, workstations, printers).
A. TRAP
B. INFORM
C. GET
D. SET
Answer: A B
Explanation
A TRAP is a SNMP message sent from one application to another (which is typically on a remote host). Their
purpose is merely to notify the other application that something has happened, has been noticed, etc. The big
problem with TRAPs is that theyre unacknowledged so you dont actually know if the remote application
received your oh-so-important message to it. SNMPv2 PDUs fixed this by introducing the notion of an
INFORM, which is nothing more than an acknowledged TRAP.
A. Message Integrity
B. Compression
C. Authentication
D. Encryption
E. Error Detection
Answer: A C D
Explanation
+ SNMPv1 The Simple Network Management Protocol: A Full Internet Standard, defined in RFC 1157.
(RFC 1157 replaces the earlier versions that were published as RFC 1067 and RFC 1098.) Security is based
on community strings.
+ SNMPv2c The community-string based Administrative Framework for SNMPv2. SNMPv2c (the c
stands for community) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905, and RFC
1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p (SNMPv2 Classic), and
uses the community-based security model of SNMPv1.
Message integrity: Ensuring that a packet has not been tampered with in transit.
Authentication: Determining that the message is from a valid source.
Encryption: Scrambling the contents of a packet prevent it from being learned by an unauthorized source.
Answer: HMAC-MD5 or HMAC-SHA (Maybe either of them will appear in the exam)
Question 6: Which three statements about the features of SNMPv2 and SNMPv3 are true? (Choose
three)
Answer: A C E
Explanation
SNMPv1/v2 can neither authenticate the source of a management message nor provide encryption. Without
authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is
also possible for nonauthorized users to eavesdrop on management information as it passes from managed
systems to the management system. Because of these deficiencies, many SNMPv1/v2 implementations are
limited to simply a read-only capability, reducing their utility to that of a network monitor; no network control
applications can be supported. To correct the security deficiencies of SNMPv1/v2, SNMPv3 was issued as a
set of Proposed Standards in January 1998. -> A is correct.
GetBulkRequest The GetBulkRequest message enables an SNMP manager to access large chunks of data.
GetBulkRequest allows an agent to respond with as much information as will fit in the response PDU. Agents
that cannot provide values for all variables in a list will send partial information. -> E is correct.
InformRequest The InformRequest message allows NMS stations to share trap information. (Traps are
issued by SNMP agents when a device change occurs.) InformRequest messages are generally used between
NMS stations, not between NMS stations and agents. -> C is correct.
Answer: A C D
Explanation
+ Network Monitoring NetFlow data enables extensive near real time network monitoring capabilities.
Flow-based analysis techniques may be utilized to visualize traffic patterns associated with individual routers
and switches as well as on a network-wide basis (providing aggregate traffic or application based views) to
provide proactive problem detection, efficient troubleshooting, and rapid problem resolution.
+ Application Monitoring and Profiling NetFlow data enables network managers to gain a detailed, time-
based, view of application usage over the network. This information is used to plan, understand new services,
and allocate network and application resources (e.g. Web server sizing and VoIP deployment) to responsively
meet customer demands.
+ User Monitoring and Profiling NetFlow data enables network engineers to gain detailed understanding
of customer/user utilization of network and application resources. This information may then be utilized to
efficiently plan and allocate access, backbone and application resources as well as to detect and resolve
potential security and policy violations.
+ Network Planning NetFlow can be used to capture data over a long period of time producing the
opportunity to track and anticipate network growth and plan upgrades to increase the number of routing
devices, ports, or higher- bandwidth interfaces. NetFlow services data optimizes network planning including
peering, backbone upgrade planning, and routing policy planning. NetFlow helps to minimize the total cost of
network operations while maximizing network performance, capacity, and reliability. NetFlow detects
unwanted WAN traffic, validates bandwidth and Quality of Service (QOS) and allows the analysis of new
network applications. NetFlow will give you valuable information to reduce the cost of operating your
network.
+ Security Analysis NetFlow identifies and classifies DDOS attacks, viruses and worms in real-time.
Changes in network behavior indicate anomalies that are clearly demonstrated in NetFlow data. The data is
also a valuable forensic tool to understand and replay the history of security incidents.
+ Accounting/Billing NetFlow data provides fine-grained metering (e.g. flow data includes details such as
IP addresses, packet and byte counts, timestamps, type-of-service and application ports, etc.) for highly
flexible and detailed resource utilization accounting. Service providers may utilize the information for billing
based on time-of-day, bandwidth usage, application usage, quality of service, etc. Enterprise customers may
utilize the information for departmental charge-back or cost allocation for resource utilization.
Question 2: What are the three things that the NetFlow uses to consider the traffic to be in a same flow?
A. IP address
B. Interface name
C. Port numbers
D. L3 protocol type
E. MAC address
Answer: A C D
Explanation
What is an IP Flow?
Each packet that is forwarded within a router or switch is examined for a set of IP packet attributes. These
attributes are the IP packet identity or fingerprint of the packet and determine if the packet is unique or similar
to other packets.
Traditionally, an IP Flow is based on a set of 5 and up to 7 IP packet attributes.
IP Packet attributes used by NetFlow:
+ IP source address
+ IP destination address
+ Source port
+ Destination port
+ Layer 3 protocol type
+ Class of Service
+ Router or switch interface
Question 3: What NetFlow component can be applied to an interface to track IPv4 traffic?
A. flow monitor
B. flow record
C. flow sampler
D. flow exporter
Answer: A
Explanation
Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform network traffic
monitoring. Flow monitors consist of a record and a cache. You add the record to the flow monitor after you
create the flow monitor. The flow monitor cache is automatically created at the time the flow monitor is
applied to the first interface. Flow data is collected from the network traffic during the monitoring process
based on the key and nonkey fields in the record, which is configured for the flow monitor and stored in the
flow monitor cache.
For example, the following example creates a flow monitor named FLOW-MONITOR-1 and enters Flexible
NetFlow flow monitor configuration mode:
Router(config)# flow monitor FLOW-MONITOR-1
Router(config-flow-monitor)#
Question 4: What command visualizes the general NetFlow data on the command line?
Answer: C
Explanation
The show ip cache flow command displays a summary of the NetFlow accounting statistics.
Question 5: What are three reasons to collect NetFlow data on a company network? (Choose three)
Answer: A D F
Explanation
Question 6: What are three factors a network administrator must consider before implementing
Netflow in the network? (Choose three)
A. CPU utilization
B. where Netflow data will be sent
C. number of devices exporting Netflow data
D. port availability
E. SNMP version
F. WAN encapsulation
Answer: A B C
Question 7: What Cisco IOS feature can be enabled to pinpoint an application that is causing slow
network performance?
A. SNMP
B. Netflow
C. WCCP
D. IP SLA
Answer: B
New CCNA Syslog Questions
Question 1: What are the popular destinations for Syslog messages to be saved?
A. Flash
B. The logging buffer RAM
C. The console terminal
D. Other terminals
E. Syslog server
Answer: B C E
Explanation
By default, switches send the output from system messages and debug privileged EXEC commands to a
logging process. The logging process controls the distribution of logging messages to various destinations,
such as the logging buffer (on RAM), terminal lines (console terminal), or a UNIX syslog server,
depending on your configuration. The process also sends messages to the console.
Note: Syslog messages can be written to a file in Flash memory although it is not a popular place to use. We
can configure this feature with the command logging file flash:filename.
Question 2: Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose
four)
A. Emergencies
B. Alerts
C. Errors
D. Warnings
E. Critical
Answer: A B C E
Explanation
In this question level 3 trap is configured so Emergencies, Alerts, critical and Errors messages are displayed.
Although this question only requires to choose 3 correct answers but maybe something is missing here.
Question 3: Which three statements about Syslog utilization are true? (Choose three)
Answer: C D F
Question 4: What command instructs the device to timestamp Syslog debug messages in milliseconds?
Answer: B
Explanation
The service timestamps debug command configures the system to apply a time stamp to debugging
messages. The time-stamp format for datetime is MMM DD HH:MM:SS, where MMM is the month, DD is
the date, HH is the hour (in 24-hour notation), MM is the minute, and SS is the second. With the additional
keyword msec, the system includes milliseconds in the time stamp, in the format HH:DD:MM:SS.mmm,
where .mmm is milliseconds
A. local4
B. local5
C. local6
D. local7
Answer: D
Question 6: What levels will be trapped if the administrator executes the command
A. Emergency
B. Notice
C. Alert
D. Error
E. Warning
Answer: A C D E
Explanation
If you specify a level with the logging trap level command, that level and all the higher levels will be
logged. For example, by using the logging trap 4 command, all the logging of emergencies, alerts, critical,
errors, warnings will be logged.
Question 7: A network administrator enters the following command on a router: logging trap 3. What
are three message types that will be sent to the Syslog server? (Choose three)
A. informational
B. emergency
C. warning
D. critical
E. debug
F. error
Answer: B D F
New CCNA Basic Questions
A. NIC
B. BIA
C. OUI
D. VAI
Answer: C
Explanation: Organizational Unique Identifier (OUI) is the first 24 bits of a MAC address for a network
device, which indicates the specific vendor for that device as assigned by the Institute of Electrical and
Electronics Engineers, Incorporated (IEEE). This identifier uniquely identifies a vendor, manufacturer, or an
organization.
Question 2: Which of the following statements describe the network shown in the graphic? (Choose
two)
Answer: A F
Explanation
Only router can break up broadcast domains so in the exhibit there are 2 broadcast domains: from e0 interface
to the left is a broadcast domain and from e1 interface to the right is another broadcast domain -> A is correct.
Both router and switch can break up collision domains so there is only 1 collision domain on the left of the
router (because hub doesnt break up collision domain) and there are 6 collision domains on the right of the
router (1 collision domain from e1 interface to the switch + 5 collision domains for 5 PCs in Production) -> F
is correct.
The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum
size of an IOS file that could be loaded if the original IOS is also kept in flash?
A. 3MB
B. 5MB
C. 7MB
D. 4MB
Answer: D
Explanation
From the exhibit we learn there are 4585552 bytes (over 4MB) available so it is only enough space for an IOS
file of 4MB. If bigger file is copied then the existing IOS file will be erased (overwritten).
Question 4: Refer to the exhibit. What is the meaning of the output MTU 1500 bytes?
A. The maximum number of bytes that can traverse this interface per second is 1500.
B. The minimum segment size that can traverse this interface is 1500 bytes.
C. The minimum segment size that can traverse this interface is 1500 bytes.
D. The minimum packet size that can traverse this interface is 1500 bytes.
E. The maximum packet size that can traverse this interface is 1500 bytes.
F. The maximum frame size that can traverse this interface is 1500 bytes.
Answer: E
Explanation
The Maximum Transmission Unit (MTU) defines the maximum Layer 3 packet (in bytes) that the layer can
pass onwards.
Question 5: A network interface port has collision detection and carrier sensing enabled on a shared
twisted pair network. From this statement, what is known about the network interface port?
Answer: C
Explanation
Modern Ethernet networks built with switches and full-duplex connections no longer utilize CSMA/CD.
CSMA/CD is only used in obsolete shared media Ethernet (which uses repeater or hub).
Question 6: In an Ethernet network, under what two scenarios can devices transmit? (Choose two)
Answer: C D
Explanation
Ethernet network is a shared environment so all devices have the right to access to the medium. If more than
one device transmits simultaneously, the signals collide and can not reach the destination.
If a device detects another device is sending, it will wait for a specified amount of time before attempting to
transmit.
When there is no traffic detected, a device will transmit its message. While this transmission is occurring, the
device continues to listen for traffic or collisions on the LAN. After the message is sent, the device returns to
its default listening mode.
So we can see C and D are the correct answers. But in fact answer C when they detect no other devices are
sending and when the medium is idle are nearly the same.
Question 7: For what two purposes does the Ethernet protocol use physical addresses? (Choose two)
Answer: A E
Explanation
Physical addresses or MAC addresses are used to identify devices at layer 2 -> A is correct.
MAC addresses are only used to communicate on the same network. To communicate on different network
we have to use Layer 3 addresses (IP addresses) -> B is not correct; E is correct.
Layer 2 frame and Layer 3 packet can be recognized via headers. Layer 3 packet also contains physical
address -> C is not correct.
On Ethernet, each frame has the same priority to transmit by default -> D is not correct.
All devices need a physical address to identify itself. If not, they can not communicate -> F is not correct.
Question 8: Which two locations can be configured as a source for the IOS image in the boot system
command? (Choose two)
A. RAM
B. NVRAM
C. flash memory
D. HTTP server
E. TFTP server
F. Telnet server
Answer: C E
Explanation
The following locations can be configured as a source for the IOS image:
+ Flash (the default location)
+ TFTP server
+ ROM (used if no other source is found)
A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signals from
a router to a leased line.
B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signals from a
router to a leased line.
C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signals from a
router to a phone line.
D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a
router to a phone line.
Answer: D
Question 10: A Cisco router is booting and has just completed the POST process. It is now ready to find
and load an IOS image. What function does the router perform next?
Answer: A
Explanation
When you turn the router on, it runs through the following boot process.
The Power-On Self Test (POST) checks the routers hardware. When the POST completes successfully, the
System OK LED indicator comes on.
The router checks the configuration register to identify where to load the IOS image from. A setting of
02102 means that the router will use information in the startup-config file to locate the IOS image. If the
startup-config file is missing or does not specify a location, it will check the following locations for the IOS
image:
The router loads the configuration file into RAM (which configures the router). The router can load a
configuration file from:
New CCNA OSI & TCP/IP Model
Question 1: Where does routing occur within the DoD TCP/IP reference model?
A. application
B. internet
C. network
D. transport
Answer: B
Explanation
The picture below shows the comparison between TCP/IP model & OSI model. Notice that the Internet Layer
of TCP/IP is equivalent to the Network Layer which is responsible for routing decision.
Router#show running-config
Building configuration
Current configuration : 659 bytes
!
version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
service password-encryption
!
hostname Router
!
enable secret 5 $1$mERr$hx5rVt7rPNoS4wqbXKX7m0
!
interface FastEthernet0/0
ip address 192.168.1.1 255.255.255.0
ip access-group 101 in
duplex auto
speed auto
!
access-1ist 101 deny tcp any any eq 22
access-1ist 101 permit ip any any
!
line con 0
password 7 0822455D0A16
login
line vty 0 4
login
line vty 5 14
login
!
end
A network administrator cannot establish a Telnet session with the indicated router. What is the cause of this
failure?
Answer: C
Question 3: Before installing a new, upgraded version of the IOS, what should be checked on the router,
and which command should be used to gather this information? (Choose two)
Answer: B D
Explanation
When upgrading new version of the IOS we need to copy the IOS to the Flash so first we have to check if the
Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we
should check the available RAM too. We can check both with the show version command.
Question 4: Refer to the exhibit. An administrator pings the default gateway at 10.10.10.1 and sees the
output as shown. At which OSI layer is the problem?
Answer: E
Explanation
The Network layer is responsible for network addressing and routing through the internetwork. So a ping
fails, you may have an issue with the Network layer (although lower layers like Data Link & Physical may
cause the problem).
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
Answer: A
Question 6: Which of the following correctly describe steps in the OSI data encapsulation process?
(Choose two)
A. The transport layer divides a data stream into segments and may add reliability and flow control
information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
Answer: A D
Explanation
The transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence
number, so that the receiving device can reassemble the data on arrival.
The transport layer also use flow control to maximize the transfer rate while minimizing the requirements to
retransmit. For example, in TCP, basic flow control is implemented by acknowledgment by the receiver of the
receipt of data; the sender waits for this acknowledgment before sending the next part.
-> A is correct.
The data link layer adds physical source and destination addresses and an Frame Check Sequence (FCS) to
the packet (on Layer 3), not segment (on Layer 4) -> B is not correct.
Packets are created when network layer encapsulates a segment (not frame) with source and destination host
addresses and protocol-related control information. Notice that the network layer encapsulates messages
received from higher layers by placing them into datagrams (also called packets) with a network layer header
-> C is not correct.
The Network layer (Layer 3) has two key responsibilities. First, this layer controls the logical addressing of
devices. Second, the network layer determines the best path to a particular destination network, and routes the
data appropriately.
-> D is correct.
The Physical layer (presentation layer) translates bits into voltages for transmission across the physical link ->
E is not correct.
A. application
B. presentation
C. session
D. transport
E. internet
F. data link
Answer: A
Explanation
FTP belongs to Application layer and it is also the highest layer of the OSI model.
Question 8: At which layer of the OSI model is RSTP used to prevent loops?
A. data link
B. network
C. physical
D. transport
Answer: A
Question 9: Which layer in the OSI reference model is responsible for determining the availability of
the receiving program and checking to see if enough resources exist for that communication?
A. transport
B. network
C. presentation
D. session
E. application
Answer: E
Question 10: A receiving host computes the checksum on a frame and determines that the frame is
damaged. The frame is then discarded. At which OSI layer did this happen?
A. session
B. network
C. physical
D. data link
E. transport
Answer: D
Explanation
When using the term frame we can easily recognize it belongs to the Data Link layer. In this layer, an
Frame Check Sequence (FCS) field is added to the frame to verify that the frame data is received correctly.
New CCNA IOS Questions
Question 1: Which command encrypts all plaintext passwords?
Answer: C
Question 2: What can be done to secure the virtual terminal interfaces on a router? (Choose two)
Answer: D E
Explanation
It is a waste to administratively shut down the interface. Moreover, someone can still access the virtual
terminal interfaces via other interfaces -> A is not correct.
We can not physically secure a virtual interface because it is virtual -> B is not correct.
To apply an access list to a virtual terminal interface we must use the access-class command. The access-
group command is only used to apply an access list to a physical interface -> C is not correct; E is correct.
The most simple way to secure the virtual terminal interface is to configure a username & password to
prevent unauthorized login -> D is correct.
Question 3: Refer to the exhibit. Why is flash memory erased prior to upgrading the IOS image from
the TFTP server?
A. The router cannot verify that the Cisco IOS image currently in flash is valid
B. Flash memory on Cisco routers can contain only a single IOS image.
C. Erasing current flash content is requested during the copy dialog.
D. In order for the router to use the new image as the default, it must be the only IOS image in flash.
Answer: C
Explanation
During the copy process, the router asked Erasing flash before copying? [confirm] and the administrator
confirmed (by pressing Enter) so the flash was deleted.
Note: In this case, the flash has enough space to copy a new IOS without deleting the current one. The current
IOS is deleted just because the administrator wants to do so. If the flash does not have enough space you will
see an error message like this:
Question 4: How does using the service password encryption command on a router provide additional
security?
Answer: B
Explanation
By using this command, all the (current and future) passwords are encrypted. This command is primarily
useful for keeping unauthorized individuals from viewing your password in your configuration file.
Question 5: What is a global command?
A. a command that is available in every release of IOS, regardless of the version or deployment status
B. a command that can be entered in any configuration mode
C. a command that is universal in application and supports all protocols
D. a command that is implemented in all foreign and domestic IOS versions
E. a command that is set once and affects the entire router
Answer: E
Explanation
Device(config)#
line vty 0 4
password 7 030752180599
login
transport input ssh
Answer: D
Question 7: Which router IOS commands can be used to troubleshoot LAN connectivity problems?
(Choose three)
A. ping
B. tracert
C. ipconfig
D. show ip route
E. winipcfg
F. show interfaces
Answer: A D F
Explanation
The ping command can be used to test if the local device can reach a specific destination -> A is correct.
tracert is not a valid command in Cisco IOS commands, the correct command should be traceroute -> B
is not correct.
The ipconfig command is not a valid command in Cisco IOS too -> C is not correct.
The show ip route command can be used to view the routing table of the router. It is a very useful command
to find out many connectivity problems (like directly connected networks, learned network via routing
protocols) -> D is correct.
winipcfg is an old tool in Windows 95/98 to view IP settings of the installed network interfaces. But it is not
a valid command in Cisco IOS commands -> E is not correct.
The show interfaces command is used to check all the interfaces on the local device only. It has very limited
information to trouble LAN connectivity problem but it is the most reasonable to choose -> F is acceptable.
A. show sessions
B. show cdp neighbors
C. show users
D. show queue
Answer: A
Question 9: Which command would you configure globally on a Cisco router that would allow you to
view directly connected Cisco devices?
A. enable cdp
B. cdp enable
C. cdp run
D. run cdp
Answer: C
Question 10: A network administrator needs to allow only one Telnet connection to a router. For anyone
viewing the confguration and issuing the show run command, the password for Telnet access should be
encrypted. Which set of commands will accomplish this task?
A. service password-encryption
access-list 1 permit 192.168.1.0 0.0.0.255
line vty 0 4
login
password cisco
access-class 1
C. service password-encryption
line vty 1
login
password cisco
D. service password-encryption
line vty 0 4
login
password cisco
Answer: C
Question 11: What is the effect of using the service password-encryption command?
A. Only passwords configured after the command has been entered will be encrypted.
B. Only the enable password will be encrypted.
C. Only the enable secret password will be encrypted
D. It will encrypt the secret password and remove the enable secret password from the configuration.
E. It will encrypt all current and future passwords.
Answer: E
Explanation
The secret password (configured by the command enable secret ) is always encrypted even if the service
password-encryption command is not used. Moreover, the secret password is not removed from the
configuration with this command, we still see it in encrypted form in the running-config -> D is not correct.
The enable password does not encrypt the password and can be viewed in clear text in the running-config.
By using the service password-encryption command, that password is encrypted (both current and future
passwords) -> A is not correct, E is correct.
Answer B Only the enable password will be encrypted seems to be correct but it implies the secret password
will not be encrypted and stay in clear text, which is not correct.
For your information, the secret password is encrypted with MD5 one-way hash algorithm which is harder to
break than the encryption algorithm used by the service password-encryption command.