640-822 - ICND1 - Interconnecting Cisco Networking Devices Part 1

Go back to Cisco

Example Questions

What kind of cable should be used to establish a trunked line between two Catalyst switches? What source and destination information can you find in the data link layer? Which Cisco IOS command displays the amount of memory that is available where the IOS image is stored on your router? Two of the following describe private IP addresses. Which are them? (Choose two.) What is the effect of using the service password-encryption command? What type of technology do DSLAMs incorporate? A router has been configured with the following command: IP nat pool nat-test 192.168.6.10 192.168.6.20 netmask 255.255.255.0 This is an example of what type of NAT? While moving from one access point to another, which wireless LAN design ensures that a mobile wireless client would not lose connectivity? What is the result of adding this command to a router that is already configured for dynamic routing? ip route 0.0.0.0 0.0.0.0 192.168.1.2 You need to create a security plan for the certways network. What should be part of a comprehensive network security plan? What objective does an IDS accomplish? When configuring NAT, the Internet interface is considered to be what? What is ROM Monitor (ROMMON)? What is the purpose of a default route? What does the "Inside Global" address represent in the configuration of NAT? Which command displays the device platform of a directly connected device? Which command is used on a Cisco router to reach the global configuration mode? What is the function of a network protocol? Which IOS command results in the output shown in the following? --- System Configuration Dialog --- At any point you may enter a question mark '?' for help. Use ctrl-c to abort configuration dialog at any prompt. Default settings are in square brackets '[]'. Would you like to enter the initial configuration dialog? [yes/no]: For the following Layer 4 protocols, which one is used for a Telnet connection? The network manager states, "The only UDP port allowed on this router interface is 53." From the statement, what can be concluded about traffic on the router interface? You need to configure the interfaces on a new router, but first you need to enter the global configuration mode. Which command is used on router 3 to reach this mode? How many hosts are available for 192.168.1.1/28? Examine the following technologies, which one will you use when a router connected to a LAN has only one WAN interface, but multiple virtual circuits are needed? The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 was issued on a router. No routing protocols or other static routes are configured on the router. Which statement is true about this command? A Cisco router has received a frame on an interface that is connected to a local network segment. The router has de-encapsulated the frame. What step is next in processing the packet? is migrating to a private IP addressing scheme. Which of the following describe the use of private IP addresses? (Choose two) 1.a protocol that converts human-readable names into machine-readable addresses 2.used to assign IP addresses automatically and set parameters such as subnet mask and default gateway 3.a protocol for using HTTP or HTTPS to exchange XML-based messages over computer networks 4.a connectionless service that uses UDP to transfer files between systems 5.a protocol used to monitor and manage network devices 6.a reliable. Connection-oriented service that uses TCP to transfer files between systems A.SNMP B.FTP C.TFTP D.DNS E.DHCP Which option is correct about the relationship between the command and its use?(Not all options are used.) 1.-R1#copy flash tftp 2.-R1#copy tftp flash 3.-R1#copy flash running-config 4.-R1#copy running-config tftp 5.-R1#copy tftp running-config 6.-R1#copy running-config startup-config It is best to use debug commands during periods of _____ network traffic and _____ users. In the OSI model, which characteristic is similar between TCP and UDP? As a network administrator, you would configure port security on a switch. Why? When you compare the differences between half-duplex and full-duplex Ethernet, which of the following characteristics are exclusive to half-duplex? (Select two answer choices) You work in a medium-sized company .The network performance of your company has slowed to the point that users are complaining. In order to resolve this problem, You are asked to determine what the users might be doing to cause the slowdown. Which two types of network services or applications most likely cause slowdown? (Choose two.) Which method of connecting a small office/home office to an ISP uses existing telephone lines? You are a network administrator working in a small-sized company. Recently, you are responsible for connecting your small office/home office to an ISP. If you want to use existing telephone lines to increase efficiency, which method will you use? Choose from the following the effect of using the service password-encryption command. Which statement is true for PPP? The command ip route 192.168.100.160 255.255.255.224 192.168.10.2 20 was performed on a router. No routing protocols or other static routes are configured on the router. Which statement best describes this command? What do you think is the purpose of a default route? What will happen when computers on a private network try to connect to the Internet via a Cisco router running PAT? Which command is used on a Cisco router named 2 to reach the global configuration mode? How can an administrator determine if a router has been configured when it is first powered up? In the configuration of NAT, what does the keyword overload signify? Which of the following are types of flow control? (Choose three.) Which command would you use to view how much space has been consumed in NVRAM? Examine the following options, which two are effects on network performance of configuring a switch to store an entire frame before forwarding it to the destination? (Choose two.) Which three statements correctly describe the operation of a full-duplex Ethernet network? (Choose three.) has chosen WPA over WEP in their wireless network. What is one reason why WPA encryption is preferred over WEP in this network? What is the purpose of the switchport command? Switch(config-if)# switchport port-security maximum 1 Switch(config-if)# switchport port-security mac-address 0018.DE8B.4BF8

Study Guides