CCENT

  1. How many collision domains exist when using a hub?
    One
  2. The ______________ part of a MAC address is assigned by the IEE to an organization and is composed of 24bits, or 3 bytes.
    organizationally unique identifier (OUI)
  3. On which layer of the OSI model do routers operate?
    Network
  4. To specify all hosts in the Class C IP network 192.16.8.0, what wildcard access list mask would you use?
  5. What do IP extended access lists use as a basis for permitting or denying packets?
    Source and destination addresses, source and destination ports, and protocol
  6. What lists use the numbers 1–99 or 1300–1999 and filter based on source IP address only.
    Standard IP access
  7. What access list will allow only web traffic into network 196.15.7.0 from any client?
    access–list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www
  8. Which router command allows you to determine whether an IP access list is enabled on a particular interface?
    show ip interface
  9. What router command allows you to view the entire contents of all access lists?
    show access–lists
  10. What causes the incrementing of runts on an interface?
    Collisions
  11. What is the IP extended access list range?
    100-–199 and 2000-–2699
  12. What is the dotted–decimal equivalent of /15?
    255.254.0.0
  13. Which command applies access list 110 inbound to an interface?
    Router(config–if)#ip access–group 110 in
  14. What is a network called that is used to allow limited access to certain resources from outside the LAN?
    DMZ
  15. The block size of a /26 network is ?
    64
  16. The output of the show startup–config command comes from
    NVRAM
  17. ________ lists use the range from 100 to 199 or from 2000 to 2699.
    IP extended access
  18. What standards–based protocol works much like CDP?
    Link Layer Discovery Protocol (LLDP)
  19. What type of mask do routes in the routing table marked with an L have?
    /32
  20. True/False: Area border routers can be in only one area at a time.
    False: Any router that is member of two areas is a border router, or an area border router (ABR), by definition.
  21. Which configuration mode and command combination sets the bandwidth metric of a Frame Relay connection to 64000 bps?
    router(config–if)#bandwidth 64
  22. True/False: Layer 2 switches and bridges are faster than routers because they don't take up time looking at the Data Link layer header information.
    False
  23. True/False: VLANs greatly reduce network security.
    False
  24. True/False: When a packet is being compared to an access list, it's always compared with each line of the access list in sequential order until it finds a match.
    True
  25. on an Ethernet network is the retransmission delay that's enforced when a collision occurs.
    Backoff
  26. What is the PDU called at the Data Link layer?
    A Frame
  27. What Application layer protocols sets up a secure session that's similar to Telnet?
    SSH
  28. What command, enabled by default starting with Cisco IOS version 12.x, allows the use of the first and last subnet in a network design?
    ip subnet–zero
  29. What mask yields only six IP addresses per subnet?
    255.255.255.248, or /29
  30. What prompt indicates you are at privileged mode?
    router#
  31. Which command backs up the Cisco IOS to a TFTP server?
    copy flash tftp
  32. What protocol resolves IP addresses to MAC address?
    ARP
  33. What command provides an excellent overview of the actual operation of all currently running protocols?
    show ip protocols
  34. True/False: Layer 2 switches and bridges look at the frame's hardware addresses before deciding to either forward, flood, or drop the frame.
    True
  35. Type the command that must be present for a layer 3 switch to provide inter–VLAN routing between the two VLANs.
    ip routing
  36. Type the command that creates a named extended access list called 150.
    ip access–list extended 150
  37. What device hosts a different subnet on each interface?
    Router
  38. In an Ethernet II frame, what is the function of the section labeled FCS?
    Error detection
  39. What mechanism is used by the client to avoid a duplicate IP address during the DHCP process?
    Gratuitous ARP
  40. Which type of protocol determines the path of a packet through a network: routing or routed?
    Routing
  41. How many subnets are contained in the network 192.168.1.0.0/27?
    Eight
  42. What is the HyperTerminal setting for connecting to a Cisco router?
    9600 bps, parity None, 1 stop bit, and 8 data bits
  43. What type of cable is used to connect to a console port of a router?
    Rolled or rollover
  44. What type of Ethernet cable is used to connect from a hub to a switch?
    Crossover
  45. The _______________ command causes the system to return you to your previous prompt after displaying a console message.
    logging synchronous
  46. True/False: OSPF uses cost as a metric.
    True
  47. What does the configuration register setting of 0x2102 do?
    Tells the router to look in NVRAM for the boot sequence
  48. What IP address is called the loopback address?
    127.0.0.1
  49. Which command can be used to determine a router's capacity to generate debug output?
    show processes cpu
  50. True/False: OSPF is called an advanced distance–vector routing protocol.
    False: EIGRP is an advanced distance–vector protocol.
  51. An IPv6 address is how many bits long?
    128
  52. True/False: A routing protocol determines the path of a packet through a network.
    True
  53. True/False: A routed protocol is assigned to an interface and determines the method of packet delivery.
    True
  54. How does inter–VLAN communication take place?
    Using a router or layer 3 switch
  55. What is shortest possible version of 2001:0db8:3c4d:0012:0000:0000:1234:56ab?
    2001:db8:3c4d:12::1234:56ab
  56. What type of IPv6 address is delivered to a single interface?
    Unicast
  57. What is the IEEE standard frame tagging method?
    802.1q
  58. Which switching technology reduces the size of a broadcast domain?
    VLANs
  59. What is the main purpose of creating VLANs?
    To break up broadcast domains at layer 2
  60. What is a publicly routable IPv6 address called?
    Global unicast
  61. What advantage is offered by LAN segmentation?
    More bandwidth is provided to each user.
  62. Which Class C mask can be used to provide seven subnets, each with 25 hosts?
    255.255.255.224, or /27, although it actually provides a total of eight subnets, each with 30 hosts
  63. ______ break up broadcast domains in layer 2 switched networks.
    Virtual LANs
  64. _____________ links are used to carry VLAN information between switches.
    Trunk
  65. Access links carry traffic for how many VLAN?
    One
  66. What IPv6 address type is the equivalent of an Automatic Private IP Address (APIPPA) address?
    Link–local
  67. The typical reason for creating network segmentation is to provide more to each user.
    Bandwidth
  68. What is the binary equivalent of the decimal number 152?
    10011000
  69. What IPv6 address type is referred to as a "one–to–nearest" address?
    Anycast
  70. What command do you use to copy a configuration from a TFTP host to a Cisco router's DRAM on your network?
    copy tftp running–config
  71. Which memory in a Cisco router stores packet buffers and routing tables?
    RAM
  72. What IPv6 address is the equivalent of 127.0.0.1 in IPv4?
    ::1
  73. What IPv6 suffix describes the multicast range?
    FF00::/8
  74. Which command will show you the IOS version running on your router?
    sh version
  75. The basic IPv6 header contains how many fields?
    Eight
  76. If you want to suspend a Telnet session, what keystroke combination would you use?
    Ctrl+Shift+6, then X
  77. To copy a configuration from the Cisco router's DRAM to a TFTP host on your network, what command can you use?
    copy run tftp
  78. The ICMPv6 packet is identified by the value 58 in the _________ field, located inside the IPv6 header.
    Next Header
  79. What component performs the function of Address Resolution Protocol in ICMPv6?
    Neighbor discovery
  80. How do IPv6 hosts receive the address of the gateway?
    Router solicitation
  81. Which command is used to find the path a packet takes through an internetwork?
    traceroute
  82. Using the prefix 2001:db8:1:1/64, convert the following MAC address into a EUI–64 address: 1020:ef01:5554.
    2001:db8:1:1:1220:efff:fe01:5554
  83. When hosts make up or receive an IPv6 address, they send three _______ packets out via NDP NS asking if anyone has this same address.
    duplicate address detection (DAD)
  84. Which command displays Cisco Discovery Protocol adjacencies?
    show cdp neighbors
  85. What command will show you a directly connected router's interface IP address?
    show cdp neighbor detail
  86. What is the IPv6 version of OSPF called?
    OSPFv3
  87. What is the Class C private IP address range?
    192.168.0.0 through 192.168.255.255
  88. You use the command to copy a configuration of a router stored on a TFTP server to a router's NVRAM.
    copy tftp startup–config
  89. On which types of networks will OSPF elect a backup designated router?
    Non–broadcast and broadcast multi–access
  90. ______________ is used to store packet buffers and routing tables, among other things.
    RAM
  91. What is the hex equivalent of 11000111?
    C7
  92. The IPv6 address for an OSPF DR is _________ .
    FF02::6
  93. The copy running–config startup–config command copies the configuration stored in___________ to _____________ .
    RAM, NVRAM
  94. What format of IPv6 addressing takes the unique MAC address of a host and inserts FF:FE in the middle of the address to change a 48–bit MAC address to a 64–bit interface ID?
    EUI–64 address
  95. To keep open multiple ____________ sessions, use the Ctrl+Shift+6, then X keystroke combination.
    Telnet
  96. What is the port number for Telnet?
    23
  97. The ping and traceroute commands can both be used to test _____________ in an internetwork.
    IP connectivity
  98. What is the hex equivalent of 01110101?
    0x75. Cisco sometimes likes to show the 0x in front of hex characters.
  99. Using the prefix 2001:db8:1:1/64, convert the following MAC address into a EUI–64 address: 0b0c:abcd:1234
    2001:db8:1:1:090c:abff:fecd:1234
  100. What standard allows the use of subnets masks other the default masks?
    Classless Inter–Domain Routing (CIDR) allows the use of subnet masks such as 255.255.224.0
Author
sethwalton
ID
320893
Card Set
CCENT
Description
cisco cards
Updated