Q:

You need the IP address of the devices with which the router has established an adjacency. Also, the retransmit interval and the queue counts for the adjacent routers  need to be  checked. What command will display the required information?

A) show ip eigrp adjacency B) show ip eigrp topology
C) show ip eigrp interfaces D) show ip eigrp neighbors
 
Answer & Explanation Answer: D) show ip eigrp neighbors

Explanation:

The show ip eigrp neighbors command allows you to check the IP addresses as well as the retransmit  interval and queue counts for the neighbors that have established an adjacency.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2412
Q:

Which of the following connection mechanism is used by Ethernet?

A) Token passing B) CSMA/CD
C) CSMA/CA D) Host polling
 
Answer & Explanation Answer: B) CSMA/CD

Explanation:

Ethernet networking uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD), a protocol that helps devices share the bandwidth evenly without having two devices transmit at the same time on the network medium.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2408
Q:

What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask?

A) 15 B) 16
C) 30 D) 31
 
Answer & Explanation Answer: C) 30

Explanation:

A/27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2403
Q:

Convert the following from binary format to decimal IP address.

11001100.00110011.10101010.01010101

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

2 2395
Q:

If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?

A) Discard it and send an error message back to the originating host B) Flood the network with the frame
C) Add the source addres and port to the MAC address table and forward the frame out the destination port D) Add the destination to the MAC address table and then forward the frame
 
Answer & Explanation Answer: C) Add the source addres and port to the MAC address table and forward the frame out the destination port

Explanation:

Since the source MAC address is not in the MAC address table, the switch will add the source address and the port it is connected to into the MAC address table and then forward the frame to the outgoing port.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2393
Q:

Which of the following is the best description of the operation of split horizon?

A) Information about a route should not be sent back in the direction from which the original update came B) It splits the traffic when you have a large bus (horizon) physical network
C) It holds the regular updates from broadcasting to a downed link D) It prevents regular update messages from reinstating a route that has gone down
 
Answer & Explanation Answer: A) Information about a route should not be sent back in the direction from which the original update came

Explanation:

A split horizon will not advertise a route back to the same router it learned the route from.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2387
Q:

Convert the following from decimal IP address to binary format.

192.168.10.15

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2373
Q:

You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue?

A) Router>ping B) Router>trace
C) Router>show ip route D) Router>show interface
 
Answer & Explanation Answer: B) Router>trace

Explanation:

The command traceroute (trace for short), which can be issued from user mode or privileged mode, is used to find the path a packet takes through an internetwork and will also show you where the packet stops because of an error on a router.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2322