Best Cisco CCNA Practice Test Questions and Study Guide in PDF for 640-802 Exam

Page 1

Vendor

: Cisco

Exam Code : &&1$

Version : 'HPR

Cheat-Test,help you pass any IT exam!


Q: 1 Refer to the exhibit. What could be possible causes for the "Serial0/0 is down" interface status? (Choose two.)

A. A Layer 1 problem exists. B. The bandwidth is set too low. C. A protocol mismatch exists D. An incorrect cable is being used. E. There is an incorrect IP address on the Serial 0/0 interface. Answer: A,D

Q: 2 Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.) A. the amount of available ROM B. the amount of available flash and RAM memory C. the version of the bootstrap software present on the router D. show version E. show processes F. show running-config Answer: B,D


Q: 3 Refer to the exhibit. Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.)

A. Host E and host F use the same IP gateway address. B. Router1 and Switch2 should be connected via a crossover cable. C. Router1 will not play a role in communications between host A and host D. D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces. E. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit. F. The FastEthernet 0/0 interface on Router1 and Switch2 trunk ports must be configured using the same encapsulation type. Answer: D,F

Q: 4 Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)


A. It ensures that data will be forwarded by RouterB. B. It provides stability for the OSPF process on RouterB. C. It specifies that the router ID for RouterB should be 10.0.0.1. D. It decreases the metric for routes that are advertised from RouterB. E. It indicates that RouterB should be elected the DR for the LAN. Answer: B,C

Q: 5 If you are a network administrator, how will you explain VTP configuration to a new technician? (Choose three.) A. In the VTP client mode, a switch is unable to update its local VLAN database. B. Configure a trunk link between the switches to forward VTP updates. C. In the VTP server mode, a switch is able to update a switch in the VTP transparent mode. D. In the VTP transparent mode, a switch will forward the received updates to other switches. E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number. F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.


Answer: A,B,D Explanation: VTP operates in one of three modes: Server - In this VTP mode you can create, remove, and modify VLANs. You can also set other configuration options like the VTP version and also turn on/off VTP pruning for the entire VTP domain. VTP servers advertise their VLAN configuration to other switches in the same VTP domain and synchronize their VLAN configuration with other switches based on messages received over trunk links. VTP server is the default mode. The VLANs information are stored on NVRAM and they are not lost after a reboot. Client - VTP clients behave the same way as VTP servers, but you cannot create, change, or delete VLANs on the local device. In VTP client mode, VLAN configurations are not saved in NVRAM.

Q: 6 Cisco IOS (originally Internetwork Operating System) is the software used on the vast majority of Cisco Systems routers and all current Cisco network switches. Which two of the following devices could you configure as a source for the IOS image in the boot system command? (Choose two.) A. RAM B. NVRAM C. flash memory D. HTTP server E. TFTP server F. Telnet server Answer: C,E

Q: 7 What are two reasons a network administrator would use CDP? (Choose two.)

A. to obtain VLAN information from directly connected switches B. to determine the status of network services on a remote device C. to determine the status of the routing protocols between directly connected routers


D. to verify the type of cable interconnecting two devices E. to verify Layer 2 connectivity between two devices when Layer 3 fails F. to obtain the IP address of a connected device in order to telnet to the device Answer: E,F Explanation: Cisco Discovery Protocol (CDP) is primarily used to obtain protocol addresses of neighboring devices and discover the platform of those devices. CDP can also be used to show information about the interfaces your router uses. CDP is an independent media protocol and runs on all Cisco-manufactured devices including routers, bridges, access servers, and switches. It should be noted that CDP is a protocol which works on the layer2. By default, multicast advertise is sent every 60 seconds to 01-00-0 c-cc-cc-cc as the destination address . When reaching the holdtime of 180 seconds , if not receiving the advertise from neighboring devices yet, the information of neighboring devices will be cleared. Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting and documenting the network. You can use: Show cdp neighbor Show cdp neighbor details Commands to gather the information of connected neighbors.

Q: 8 Refer to the exhibit. Both switches are using a default configuration. Which two destination addresses will host 4 use to send data to host 1? (Choose two.)


A. the IP address of host 1 B. the IP address of host 4 C. the MAC address of host 1 D. the MAC address of host 4 E. the MAC address of the Fa0/0 interface of the R1 router F. the MAC address of the Fa0/1 interface of the R1 router Answer: A,F

Q: 9 Exhibit:


Refer to the exhibit. The router has been configured with these commands:

What are the two results of this configuration? (Choose two.) A. The default route should have a next hop address of 64.100.0.3. B. Hosts on the LAN that is connected to FastEthernet 0/1 are using public IP addressing. C. The address of the subnet segment with the WWW server will support seven more servers. D. The addressing scheme allows users on the Internet to access the WWW server. E. Hosts on the LAN that is connected to FastEthernet 0/1 will not be able to access the Internet without address translation


Answer: D,E Explanation: Since the hosts on the Fast Ethernet 0/1 network are using private RFC 1918 IP addressing (192.168.10.0/24) their IP addresses will need to be translated into a publicly routable address in order to access the Internet. However, the server is using the 198.133.219.9 IP address, which is publicly routable and so Internet users can indeed access this server (assuming that the 198.133.219.9 IP address has been correctly assigned to the network)

Q: 10 Your Company has installed IP phones. Both the phones and the office computers connect to the same device. The phone traffic and the office computer data traffic must be on different networks to ensure maximum throughput for the phone data. Which network device can be best connected to the phones and computers, and which technology will be performed on this device? (Choose two.) A. hub B. router C. switch D. stp E. subinterfaces F. VLAN Answer: C,F Explanation: You can configure VLANs on the switch to distinguish two types of data traffic.

Q: 11 Which two benefits can be obtained by using VTP in a switching environment? (Choose two.) A. Allowing frames from multiple VLANs to use a single interface. B. Allowing switches to read frame tags. C. Maintaining VLAN consistency across a switched network. D. Allowing VLAN information to be automatically propagated throughout the switching environment.


E. It allows ports to be assigned to VLANs automatically. Answer: C,D Explanation: VTP minimizes the possible configuration inconsistencies that arise when changes are made. These inconsistencies can result in security violations, because VLANs can crossconnect when duplicate names are used. They also could become internally disconnected when they are mapped from one LAN type to another, for example, Ethernet to ATM LANE ELANs or FDDI 802.10 VLANs. VTP provides a mapping scheme that enables seamless trunking within a network employing mixed-media technologies. VTP provides the following benefits:

Q: 12 Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.) A. It establishes a static route to the 172.16.3.0 network. B. It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network. C. It creates a static route to the 192.168.2.0 network. D. It uses the default administrative distance. E. It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4. F. It is a route that would be used last if other routes to the same destination exist. Answer: A,D Explanation: This question is to examine the static route-related concept. ip route 172.16.3.0 255.255.255.0 192.168.2.4 This is a static route configuration command. 172.16.3.0 is the destination network, 192.168.2.4 is the next hop. The administrative distance is not configured, so the default administrative distance is used. The correct answers are A and D.


Q: 13 Which two of the following are advantages of Layer 2 Ethernet switches over hubs? (Choose two.) A. To increase the size of broadcast domains B. To filter frames according to MAC addresses C. To allow simultaneous frame transmissions D. To increase the maximum length of UTP cabling between devices E. decreasing the number of collision domains F. increasing the size of broadcast domains Answer: B,C Explanation: A hub is a broadcast domain and a collision domain, while a switch is a broadcast domain, each interface is a collision domain. The switch is a device of data link layer, forwards and floods data frames based on the MAC address. The hub adopts the shared bandwidth working mode, while the switch adopts dedicated bandwidth. A half duplex connection is where only one device can send or receive at a time. A full duplex connection is where both devices can send and receive at the same time.

Q: 14 Refer to the exhibit. A network associate needs to configure the switches and router in the graphic so that the hosts in VLAN3 and VLAN4 can communicate with the enterprise server in VLAN2. Which two Ethernet segments would need to be configured as trunk links? (Choose two.)


A. A B. B C. C D. D E. E F. F Answer: C,F Explanation: Layer 3 routing is needed to implement communication between VLANs, so a trunk link is configured between ROuter and Switch2. Both Switch1 and Switch2own VLAN3 and VLAN4 members, so a trunk link is configured between Switch1 and Switch2.

Q: 15 Which two values are used by Spanning Tree Protocol to elect a root bridge? (Choose two.) A. bridge priority B. IP address C. MAC address D. IOS version E. amount of RAM F. speed of the links Answer: A,C Explanation: Two values are compared to elect a root bridge in STP: bridge priority and MAC address. Switch having lowest bridge ID will become the root bridge. The bridge ID is how STP keeps track of all the switches in the network. It is determined by a combination of the bridge priority (32,768 by default on all Cisco switches) and the base MAC address. The bridge with the lowest bridge ID becomes the root bridge in the network.

Q: 16


Refer to the exhibit. Assume that the routing protocol referenced in each choice below is configured with its default settings and the given routing protocol is running on all the routers. Which two conditional statements accurately state the path that will be chosen between networks 10.1.0.0 and 10.3.2.0 for the routing protocol mentioned? (Choose two.)

A. If OSPF is the routing protocol, the path will be from R1 to R3 to R4 to R5. B. If OSPF is the routing protocol, the path will be from R1 to R2 to R5. C. If OSPF is the routing protocol, the path will be from R1 to R5. D. If RIPv2 is the routing protocol, the path will be from R1 to R3 to R4 to R5. E. If RIPv2 is the routing protocol, the path will be from R1 to R5. Answer: A,E

Q: 17 Refer to the exhibit. A network administrator is adding two new hosts to SwitchA. Which three values could be used for the configuration of these hosts? (Choose three.)


A. host A IP address: 192.168.1.79 B. host A IP address: 192.168.1.64 C. host A default gateway: 192.168.1.78 D. host B IP address: 192.168.1.128 E. host B default gateway: 192.168.1.129 F. host B IP address: 192.168.1.190 Answer: A,C,F

Q: 18 What will happen after changing the configuration register to 0x2142 and rebooting the router? (Choose two.) A. The IOS image will be ignored. B. The router will prompt to enter initial configuration mode. C. The router will boot to ROM. D. Any configuration entries in NVRAM will be ignored. E. The configuration in flash memory will be booted. Answer: B,D

Q: 19


Refer to the exhibit. The networks connected to router R2 have been summarized as a 192.168.176.0/21 route and sent to R1. Which two packet destination addresses will R1 forward to R2? (Choose two.)

A. 192.168.194.160 B. 192.168.183.41 C. 192.168.159.2 D. 192.168.183.255 E. 192.168.179.4 F. 192.168.184.45 Answer: B,E

Q: 20 Which three statements are typical characteristics of VLAN arrangements? (Choose three.) A. A new switch has no VLANs configured. B. Connectivity between VLANs requires a Layer 3 device. C. VLANs typically decrease the number of collision domains. D. Each VLAN uses a separate address space. E. A switch maintains a separate bridging table for each VLAN. F. VLANs cannot span multiple switches. Answer: B,D,E


Q: 21 Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)

A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table. B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol. C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default. D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default. E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table. F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations. Answer: A,D,E


Q: 22 Refer to the exhibit. Which three statements correctly describe Network Device A? (Choose three.)

A. With a network wide mask of 255.255.255.128, each interface does not require an IP address. B. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet. C. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other. D. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other. E. With a network wide mask of 255.255.254.0, each interface does not require an IP address. Answer: B,D,E

Q: 23 On the basis of the IEEE 802.1w standard, which two switch ports can forward traffic? A. alternate B. backup C. designated D. disabled E. root


Answer: C,E

Q: 24 Refer to the exhibit. Given the output shown from this Cisco Catalyst 2950, what is the most likely reason that interface FastEthernet 0/10 is not the root port for VLAN 2?

A. This switch has more than one interface connected to the root network segment in VLAN 2. B. This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree. C. This switch interface has a higher path cost to the root bridge than another in the topology. D. This switch has a lower bridge ID for VLAN 2 than the elected designated switch. Answer: C Explanation: This question is to check the STP technology. When STP is running in a network with loops, ports will transition into the forwarding state or the blocking state. Here decisive factor is the cost to reach the root bridge, the port with the higher cost is in the blocking state, while the port with the lower cost is in the forwarding state.

Q: 25 Refer to the exhibit. The network administrator must establish a route by which London workstations can forward traffic to the Manchester workstations. What is the simplest way to accomplish this?


A. Configure a dynamic routing protocol on London to advertise all routes to Manchester. B. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester. C. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router. D. Configure a static default route on London with a next hop of 10.1.1.1. E. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2. F. Configure Manchester to advertise a static default route to London. Answer: E

Q: 26 Refer to the exhibit. This command is executed on 2960Switch: 2960Switch(config)# mac-address-table static 0000.00aa.aaaa vlan 10 interface fa0/1


Which two of these statements correctly identify results of executing the command? (Choose two.) A. Port security is implemented on the fa0/1 interface. B. MAC address 0000.00aa.aaaa does not need to be learned by this switch. C. Only MAC address 0000.00aa.aaaa can source frames on the fa0/1 segment. D. Frames with a Layer 2 source address of 0000.00aa.aaaa will be forwarded out fa0/1. E. MAC address 0000.00aa.aaaa will be listed in the MAC address table for interface fa0/1 only. Answer: B,E

Q: 27 As a network administrator, you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of devices in a WAN? (Choose three) A. A CSU/DSU terminates a digital local loop. B. A modem terminates a digital local loop. C. A CSU/DSU terminates an analog local loop. D. A modem terminates an analog local loop. E. A router is commonly considered a DTE device. F. A router is commonly considered a DCE device. Answer: A,D,E Explanation: Layer 2 switching is considered hardware-based bridging because it uses specialized hardware called an application-specific integrated circuit (ASIC). ASICs can run up to gigabit speeds with very low latency rates. A router is commonly considered to be a DTE device, while a CSU/DSU is considered the DCE


device. Switches usually have higher port number then bridge. Generally bridges have two ports. Both operates on Data link layer.

Q: 28 What are two characteristics of Telnet? (Choose two.) A. It sends data in clear text format. B. It is no longer supported on Cisco network devices. C. It is more secure than SSH. D. It requires an enterprise license in order to be implemented. E. It requires that the destination device be configured to support Telnet connections. Answer: A,E Explanation: Telnet sends data in clear text. If a remote device wants to access the destination device through Telnet, the destination device must be configured to support Telnet connections.

Q: 29 Which two security appliances will you use in a network? (Choose two.) A. ATM B. ids C. ios D. iox E. ips F. SDM Answer: B,E

Q: 30


A single 802.11g access point has been configured and installed in the center of a square office. A few wireless users are experiencing slow performance and drops while most users are operating at peak efficiency. What are three likely causes of this problem? (Choose three.) A. mismatched TKIP encryption B. null SSID C. cordless phones D. mismatched SSID E. metal file cabinets F. antenna type or direction Answer: C,E,F Explanation: A. Cordless phones may interfere in wireless NIC. B. mismatched SSID SSID(Service Set Identifier)can also be written as ESSID, which is used to distinguish different networks and has 32 characters at most , WLAN cards set up different SSID to enter different networks. SSID is usually broadcast by AP, you can view SSID of the present area through XP built-in scanning feature .Taking security into consideration, SSID can be not broadcast, meanwhile users need to set up SSID manually to enter the appropriate network. In simple terms, SSID is the name of a local area network; only those computers that set up the same SSID values can communicate with each other. If SSID fails to match, wireless will fail in connection, and no wireless network inefficiency will appear. C. metal file cabinets may have a certain amount of shielding D. antenna type or direction


Cheat-Test.com - The Worldwide Renowned IT Certification Material Provider! The safer, easier way to help you pass any IT Certification exams. We provide high quality IT Certification exams practice questions and answers (Q&A). Especially Cisco, Microsoft, HP, IBM, Oracle, CompTIA, Adobe, Apple, Citrix, EMC, ,VDFD, $YD\D, S$3 and so on. And help you pass any IT Certification exams at the first try.

Cheat-Test product Features: ●

Verified Answers Researched by Industry Experts

Questions updated on regular basis

Like actual certification exams our product is in multiple-choice questions (MCQs).

Our questions and answers are backed by our GUARANTEE.

7x24 online customer service: contact@cheat-test.com

Click Here to get more Free Cheat-Test Certification exams!

http://www.Cheat-Test.com


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.