CCNA Practice exam questions part 3 (51-75)


51 Which addresses are INCORRECTLY paired with their class?

A. 240 - 255, Class D
B. 240 - 255, Class E
C. 224 - 239, Class D
D. 224 - 239, Class E

Ans A & D

191, Class B, 192 to 223, Class C; 224 to 239, Class D; and
240 to 255, Class E.
52 Which IP Address Class is INCORRECTLY paired with its range
of network numbers?

A. Class A addresses include 192.0.0.0 through 223.255.255.0
B. Class A addresses include 1.0.0.0 through 126.0.0.0
C. Class B addresses include 128.0.0.0 through 191.255.0.0
D. Class C addresses include 192.0.0.0 through 223.255.255.0
E. Class D addresses include 224.0.0.0 through 239.255.255.0

Ans A

53 Which IP Address Class can have 16 million subnets but
support 254 hosts?

A. Class C
B. Class A
C. Class B
D. Class D

Ans A

54 Which IP Address Class can have 64,000 subnets with 64,000
hosts per subnet?

A. Class B
B. Class A
C. Class C
D. Class D

Ans A

55 There are two processes to pair MAC address with IP
addresses. Which process finds an IP address from a MAC
address?

A. RARP
B. ARP
C. RIP
D. IGRP

Ans A


56 When the router runs out of buffer space, this is called
________.
A. Source Quench
B. Redirect
C. Information Request
D. Low Memory

Ans A

57 Which protocol carries messages such as destination
Unreachable, Time Exceeded, Parameter Problem, Source
Quench, Redirect, Echo, Echo Reply, Timestamp, Information
Request, Information Reply, Address Request, and Address
Reply?

A. ICMP
B. UDP
C. TCP
D. TFTP
E. FTP

Ans A

58 Two of the protocols that can be carried in the Protocol
field of an IP packet are?
A. TCP
B. UDP
C. FTP
D. TFTP

Ans A & B
.
59 Where would network testing be included in an IP packet?

A. IP Options field
B. Identification field
C. Type of Service field
D. Reservation field

Ans A


60 What field tells the Internet layer how to handle an IP packet?
A. Type of Service
B. Identification
C. Flags
D. Frag Offset

Ans A

61 Which fields of an IP packet provide for fragmentation of
datagrams to allow differing MTUs in the internet?

A. Identification
B. Flags
C. Frag Offset
D. Type of Service
E. Total Length

Ans A, B & C

62 Which processes does TCP, but not UDP, use?

A. Windowing
B. Acknowledgements
C. Source Port
D. Destination Port

Ans A & B

63 What is the UDP datagram format?

A. Source Port - 16 bits, Destination Port - 16 bits, Length
- 16 Bits, Checksum - 16 bits, Data
B. Destination Port - 16 bits, Source Port - 16 bits, Length
- 16 Bits, Checksum - 16 bits, Data
C. Source Port - 16 bits, Destination Port - 16 bits,
Checksum - 16 Bits, Length - 16 bits, Data
D. Source Port - 8 bits, Destination Port - 8 bits, Length -8
Bits, Checksum - 8 bits, Data

Ans A

64 What is the function of DDR on Cisco routers?

A. DDR is dial--on-demand routing. It provides a continuous LAN only connection.
B. DDR is dial-on-demand routing. It provides routing for high volume traffic.
C. DDR is dial--on-demand routing. It provides a continuous WAN connection.
D. DDR is dial-on-demand routing. It provides routing for low volume and periodic
traffic.

Answer: D

65 What are the two types of access lists that can be configured on a Ciscorouter?

A. Standard
B. Extended
C. Filtering
D. Packet

Ans: A & B

66 When using access lists, what does a Cisco router check first?

A. To see if the packet is routable or bridgeable
B. The destination address
C. The source address
D. The packet contents

Ans A

67 How many access lists are allowed per interface?

A. One per port, per protocol
B. Two per port, per protocol
C. Unlimited
D. Router interface +1 per port.

Ans: A

68 What do the following commands accomplish?
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any
interface ethernet 0
IP access-group 1 out

A. This will block traffic from subnet 172.16.4.0 and allow all other traffic.
B. This will allow traffic from subnet 172.16.4.0 and block all other traffic.
C. All traffic is allowed.
D. All traffic is blocked.

Ans: A

69 What do the following statements in an extended access list accomplish?access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255
A. This will block ftp traffic.
B. This will block http traffic.
C. This will permit ftp traffic.
D. This will permit tftp traffic.

Ans: A

70 Access lists are numbered. Which of the following ranges could be used for
an IP access list?
A. 600 - 699
B. 100 - 199
C. 1 - 99
D. 800 - 899
E. 1000 - 1099

Answer: B & C


71 Cisco routers use wildcard masking to identify how to check or ignore
corresponding IP address bits. What does setting a wildcard mask bit to 0 cause
the router to do?
A. It tells the router to check the corresponding bit value.
B. It tells the router to ignore the corresponding bit value.
C. It tells the router to check its alternate routing list.
D. It tells the router to use its primary routing list.


72 You are a system administrator and you want to deny access to a group of
computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask
would you use?
A. 0.0.15.255
B. 0.0.255.255
C. 0.0.31.255
D. 0.0.127.255
E. 0.0.255.255

Ans: A


73 In order to limit the quantity of numbers that a system administrator has to
enter, Cisco can use which abbreviation to indicate 0.0.0.0?
A. host
B. any
C. all
D. include

Ans: A

74 What do the following commands accomplish?
access-list 1 permit 172.16.0.0 0.0.255.255
interface ethernet 0
IP access-group 1 out
interface ethernet 1
IP access-group 1 out

A. Only traffic from the source network 172.16.0.0 will be blocked.
B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-
172.16.0.0 network traffic is blocked.
C. Non-172.16.0.0 traffic will be forwarded.
D. All traffic will be forwarded.

Ans: B

.
75 When using access lists, it is important where those access lists are placed.
Which statement best describes access list placement?

A. Put standard access lists as near the destination as possible. Put extended access
lists as close to the source as possible.
B. Put extended access lists as near the destination as possible. Put standard access
lists as close to the source as possible.
C. It isn't import where access lists are placed since the router will read and cache the
whole list.
D. Put access lists as close to corporate headquarters as possible.
Ans A

No comments:

Post a Comment