CISCO Certification Questions

Q:

You are the network administrator and are given the tasks to plan for the future expansion of the network. You decide to subnet the current network of 172.15.0.0. What will be the subnet mask be if every subnet has to allocate 500 hosts.

A) 255.255.0.0 B) 255.0.0.0
C) 255.255.240.0 D) 255.255.254.0
 
Answer & Explanation Answer: D) 255.255.254.0

Explanation:

Explanation: The requirement of having to allocate 500 hosts on each subnet can be achieved by the following: 2^9 = 512. So deducting the broadcast and network address we have 510 possible hosts on each subnet. We used 9 bits to allocate the hosts, this leaves us 7 bits for possible subnets. Those 7 bits in binary is 1111 1110 or 254 in decimal.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 2679
Q:

When a PC sends a packet to another PC in a remote network, what destination IP address and MAC address will be in the frame that it sends to its default gateway?

Answer

It will use the gateway interface MAC at L2 and the actual destination IP at L3. 

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2626
Q:

What port number is used for FTP control?

A) 20 B) 21
C) 22 D) 25
 
Answer & Explanation Answer: B) 21

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

1 2596
Q:

What port number is used for DHCP?

A) 67 B) 68
C) 69 D) Both A and B
 
Answer & Explanation Answer: D) Both A and B

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

2 2589
Q:

As a network administrator we want to make it easy to assign IP addresses to hosts. What protocol do we use?

A) DNS B) DHCP
C) HSRP D) NTP
 
Answer & Explanation Answer: B) DHCP

Explanation:

Explanation: DHCP, as described by RFC 1541, or Dynamic Host Configuration Protocol is used for dynamically assigning network addresses and host specific configuration parameters.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

0 2577
Q:

Which IEEE committee has been sanctioned by WAP and is called WPA2?

Answer

The IEEE 802.11i standard has been sanctioned by WPA and is termed WPA version 2.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

1 2575
Q:

What command would you use to create an extended access list that stops host 172.16.10.1 fro telnetting to host 172.16.30.5?

Answer

access - list 110 deny tcp host


172.16.10.1  host  172.16.30.5  eq  23


access - list 110 permit ip any any

Report Error

View answer Workspace Report Error Discuss

Subject: CCNA

0 2545
Q:

You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?

A) You copied the wrong configuraion into RAM B) You copied the configuration into flash memory instead
C) The copy did not override the shutdown command in running-config D) The IOS became corrupted after the copy command was initiated
 
Answer & Explanation Answer: C) The copy did not override the shutdown command in running-config

Explanation:

Since the configuration looks correct, you probably didn't screw up the copy job. However , when you perform a copy from a network host to a router , the interfaces are automatically shut dow and need to be manually enabled with the no shutdown command.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA

0 2537