1. Before installing a new upgraded version of the IOS, what would be checked on the router, and which command should be used to gather the information?
    The amount of available flash and RAM. Command used- show version
  2. Command used to determine the path a packet takes through the network
  3. What type of attack is characterized by a flood of packets requesting TCP connections to the server?
    Denial of Service (DoS)
  4. What Command is used to copy the config from RAM to NVRAM?
    copy running config - copy startup config (copy run start)
  5. Which protocols are used to successful ping an address to test connectivity?
    PING and ARP
  6. In an Ethernet network under what two scenarios
    can devices transmit?
    1, When they detect no other devices are sending

    2. When the medium is idle
  7. The debug command will produce what type of output?
    The effects of changes in real-time.
  8. Which VTP mode is capable of creating only local VLANs and does not synchronize with
    other switches in the VTP domain?
    Transparent mode
  9. Indicate the type of problem if any:
    Serial 0/1 is up, line protocol is up
    The port is operational
  10. Indicate the type of problem if any: Serial 0/1 is up, line protocol is down:
    Layer 2 problem
  11. Indicate the type of problem if any: Serial 0/1 is down, line protocol is down:
    Layer 1 problem
  12. Indicate the type of problem if any: Serial 0/1 is administratively down, line protocol is down:
    Port disabled.
  13. Two buildings on the Microsoft campus must be connected to use Ethernet with a bandwidth of at leats 100 Mbps. The company is concerned about possible problems from voltage potential difference between the two buildings. Which media type shoudl be used for the connection:
    a: UTP cable
    b: STP cable
    c: coaxial cable
    d: fiber optic cable.
    D: Fiber optic cable.
  14. In OSPF the Loopback address that is the lowest IP address should be specifed by the lowest or highest IP address?
    OSPF router ID should be specified by the lowest IP address of the loopback address.
  15. What two things will a router do when running a
    distance vector routing protocol?
    • 1. Send periodic updates regardless of topology
    • changes
    • 2. Update the routing table based on updates from
    • their neighbors
  16. Which line from the output of the show ip interface command indicates a layer 1
    S0/0 is down, line protocol is down
  17. What port state is introduced by Rapid-PVST?
  18. What is one reason WPA encryption is preferred over WEP?
    The values of WPA keys can change dynamically while the system is used.
  19. Which command allows you to see output from the OSPF debug command?
    terminal monitor
  20. You have finished physically installing an access point on the ceiling at your office. At a minimum, which parameter must be configured on the access point in order to allow a wireless client to operate it?
  21. What two technologies can be implemented to prevent unauthorized access to a server?
    VLANs and ACLs
  22. What action will result from executing these commands:
    Switch (config-if)# switchport port-security
    Swithc (config-if)# switchport port-security mac-address sticky
    A dynamically learned MAC address is saved in the running-config file.
  23. Which set of commands is recommended to prevent the use of a hub in the access layer?
    • switch (config-if)# switchport mode access
    • switch (config-if)# swithcport port-security maximum 1
  24. By changing the config register to 0x2142 and rebooting the router what two results will happen from making the change?
    • 1. The router will prompt to enter initial config mode.
    • 2. Any configuration entries in NVRAM will be ignored.
  25. Which are not valid IPv6 addresses:
    a. ::
    b. ::192:168:0:1
    c. 2000::
    d. 2001:3452:4952:2837::
    e. 2002:c0a8:101::42
    f. 2003:dead:beef:4dad:23:46:bb:101
    C and D
  26. What is the type of cable used to connect the COM port of a host to the COM port of a router or switch?
  27. Which protocol does DNS use?
  28. Three likely causes of 802.11g access point wireless interference include:
    cordless phoens, metal file cabinets and antenna type or direction.
Card Set
these are a collection of questions that you can expect to find on the CCNA 640-802 exam