Do you know that? Women (47%) tend to have more free time than men do (45%) once they�re self-employed next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Elance test answers << IT & Programming category

Test answers for CCNA 2016

(94) Last updated: January 22
Elance • IT & Programming
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

94 Answered Test Questions:

1. Which layer of OSI does Switches operate ?

Answers:

• Network Layer

• Data Link Layer

• Physical Layer

• Session Layer

• Transport Layer

2. Which information must a router have in order to perform proper and efficient routing?

Answers:

• Number of other packets in a single flow of data

• Destination application of an incoming packet

• Destination network address of an incoming packet

• Number of routers that know a path to the destination

3. How often are BPDUs sent from a layer 2 device?

Answers:

• Always

• Every 10 minutes

• Every 2 minutes

• Every 2 seconds

4. what is one benefit of PVST+?

Answers:

• PVST+ automatically selects the root bridge location, to provide optimize.

• PVST+ supports layer3 load balancing without loops.

• PVST+ allows the root switch location to be optimized per VLAN

• PVST+ reduces the CPU cycles for all the switches in the network.

5. What command will display the line, protocol, DLCI, and LMI information of an interface?

Answers:

• show interface

• sh pvc

• sho runn

• show frame-relay pvc

6. Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?

Answers:

• 192.168.168.129–190

• 192.168.168.129–199

• 192.168.168.128–194

• 192.168.168.128–190

7. Calculate the number of usable networks and usable hosts for the network 210.106.14.0/24.

Answers:

• 6 networks with 30 hosts

• 1 network with 254 hosts

• 2 networks with 128 hosts

• 4 networks with 64 hosts

8. A routing table contains static, RIP, and IGRP routes for the same destination network. Which route would normally be used to forward data?

Answers:

• The RIP route

• The static route

• All three will load balance

• The IGRP route

9. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?

Answers:

• Static

• Still

• NAT

• PAT

10. What is the administrative distance of OSPF?

Answers:

• 120

• 100

• 170

• 90

• 110

11. Which router command allows you to view the entire contents of all access lists?

Answers:

• show ip interface

• show all access-lists

• show interface

• show access-lists

12. Which of the following commands will allow you to set your Telnet password on a Cisco router?

Answers:

• line aux

• line con

• line vty

• line telnet

13. What is the connection-oriented protocol in the TCP/IP protocol stack?

Answers:

• OSPF

• DNS

• IP

• UDP

• TCP

14. What device hosts a different subnet on each interface

Answers:

• Hub

• Router

• Switch

15. What is the distance limitation for 100BaseT?

Answers:

• 25 meters

• 1000 feet

• 607 feet

• 185 meters

• 100 meters

16. When designing a switch internetwork, one important consideration is the physical cabling distance. What is the maximum allowable distance of the 100BaseTX standard?

Answers:

• 10 m

• 1000 m

• 95 m

• 100 m

• 50 m

17. What does the Frame Relay switch use to distinguish between each PVC connection?

Answers:

• Data link connection identifier (DLCIs)

• CNs

• FECNs

• Local management interface LMI

18. How long is an IPv6 address?

Answers:

• 64

• 32

• 124

• 128

19. Where is a hub specified in the OSI model?

Answers:

• Physical layer

• Outer layer

• Inner layer

• Session layer

20. Which protocol does Ping use?

Answers:

• ICMP

• BootP

• TCP

• ARP

21. What protocol resolves IP addresses to MAC address?

Answers:

• NAT

• TCP

• ARP

• RIP

• UDP

22. Which of these are NOT included in the lower layer of the OSI model?

Answers:

• Application

• Physical

• Network

• Data Link

23. Routers that have flash memory typically have preloaded copy of Cisco IOS software. Which command should you use to make backup copy of the software image onto a network server?

Answers:

• Write Backup TFTP

• Copy backup 2 (server-name)

• Write Backup (server-name)

• Save Copy TFTP

• Copy Flash TFTP

24. Which class of IP address has the most host addresses available by default?

Answers:

• C

• A

• B and C

• B

25. How many collision domains are created when you segment a network with a 12-port switch?

Answers:

• 5

• 2

• 1

• 12

26. Which command sets IGRP as the routing protocol for autonomous system 100?

Answers:

• Router(config)# enable igrp 100

• Router(config)# igrp 100

• Router(config)# router igrp 100

• Router(config)# network 100

27. What does the command - routerA(config)#line cons 0 - allow you to perform next?

Answers:

• Unleash the hounds

• Shut down the router

• Disable console connections

• Set the Telnet password

• Set your console password

28. What is the extension of cisco IOS file?

Answers:

• .tar

• .csco

• .scr

• .exe

• .bin

29. Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?

Answers:

• G

• R

• F

• A

30. DCLI is to frame relay as MAC is to:

Answers:

• LCI

• None of these

• Ethernet

• PVC

31. Which one of the following is true regarding VLANs?

Answers:

• You should not have more than 10 switches in the same VTP domain

• VTP is used to send VLAN information to switches in a configured VTP domain

• VLANs are configured by default on all Cisco switches

• VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed

32. What is the bit length and expression form of a MAC address?

Answers:

• 24 bits expression as a hexadecimal number

• 24 bits expression as a decimal number

• 36 bits expression as a binary number

• 48 bits expression as a hexadecimal number

• 48 bits expression as a decimal number

33. Which network protocol does DNS use?

Answers:

• FTP

• UDP

• TFTP

• (all of these)

• SCP

34. How are frame relay virtual circuits Identified?

Answers:

• VPI

• MAC

• DLCI

• CIR

• SPID

35. In practical IPv6 application, The encapsulation of IPv6 packets inside IPv4 packets is called what?

Answers:

• tunneling

• NAT

• hashing

• routing

36. What was the key reason the International Organization for Standardization released the OSI model?

Answers:

• The network administrator could increase the overall speed of their network

• Different vendors networks could work with each other

• The industry could create a standard for how computers work

• Users could access network server faster

37. While performing the password recovery procedure on your 2500 series Cisco router, you type in the following command.  o/r0x2142  What is the purpose of this command?

Answers:

• It is used to save the changes to the configuration

• It is used to restart the router

• It is used to bypass the configuration in NVRAM

• It is used to enter ROM Monitor mode

• It is used to view the lost password

38. What is the default administrative distance for a static route to a next-hop address?

Answers:

• 20

• 0

• 1

• 90

• 5

39. An Ethernet term used to describe a network collection of devices in which one particular device sends a packet on a network segment and forces all other devices on that same segment to pay attention to it is called a:

Answers:

• Window

• Three-way handshake

• Collision domain

• Hop count

40. Routing protocols can be generally classified into distance-vector or link-state. Each method has its own advantages and disadvantages. Which of the following routing protocol takes the benefits of both methods?

Answers:

• OSPF

• EIGRP

• IGRP

• RIP

• IS-IS

41. Which is a valid ipv6 loopback Addresse?

Answers:

• FE00:/12

• FF00::/10

• ::1

• 2000::/3

42. Which statement about switched and routed data flow is correct?

Answers:

• Switches create separate collision domains but a single broadcast domain. Routers provide a separate broadcast domains

• Switches create separate collision domains and separate broadcast domains. Routers provide separate collision domains

• Switches create a single collision domain and a single broadcast domain. Routers provide separate broadcast domains

• Switches create a single collision domain and a separate broadcast domain. Router provides a separate broadcast domain as well

43. Which protocol is used to send a destination network unknown message back to originating hosts?

Answers:

• ARP

• TCP

• ICMP

• BootP

44. Which command enables directly connected network 199.55.72.0 to be used by RIP?

Answers:

• Router(Config-router)# network 199.55.0.0

• Router(Config)# rip 199.55.0.0

• Router(Config-router)# rip 199.55.72.0

• Router(Config-router)# network 199.55.72.0

45. Which switch would STP choose to become the root bridge in the selection process?

Answers:

• C. 32769: 11-22-33-44-55-65

• A. 32768: 11-22-33-44-55-66

• D. 32769: 22-33-44-55-66-78

• B. 32768: 22-33-44-55-66-77

46. What does a VLAN do?

Answers:

• Acts as the fastest port to all servers

• Provides multiple collision domains on one switch port

• Provides multiple broadcast domains within a single collision domain

• Breaks up broadcast domains in a layer 2 switch internetwork

47. What is the effect of using the service password-encryption command?

Answers:

• Only the enable secret password will be encrypted.

• It will encrypt all current and future passwords.

• Only passwords configured after the command has been entered will be encrypted.

• Only the enable password will be encrypted.

48. If user response drops as a network continues to grow, what should you do?

Answers:

• Block the most inactive IP addresses

• Segment the network

• Upgrade to a newer switch

• Create a new broadcast domain

49. What command can you type to view the connections after telneting into multiple routers simultaneously?

Answers:

• sh sessions

• sh ports

• sh connections

• sh host

• sh users

50. What is a stub network?

Answers:

• A network with more than one exit point

• A network that has only one entry and exit point

• A network with more than one exit and entry point

• A network with only one entry and no exit point

51. Which parameter must be supplied when initializing the IGRP routing process?

Answers:

• Connected network numbers

• An autonomous system number

• A registered administrative id

• An IP address mask

• Metric weights

52. What does the 'passive' command provide to the RIP dynamic routing protocol?

Answers:

• Stops an interface from sending or receiving periodic dynamic updates

• Stops the router from sending any dynamic updates

• Stops an interface from sending periodic dynamic updates but not from receiving updates

• Stops the router from receiving any dynamic updates

53. Which layer in the OSI model provides error checking?

Answers:

• Presentation

• Data-Link

• Transport

• Physical

• Session

54. Which IOS command is used to configure encapsulation for a PPP serial link on a Cisco Router?

Answers:

• ip encapsulation ppp

• encapsulation ip ppp

• encapsulation ppp-synch

• encapsulation ppp

55. How many broadcast domains are created when you segment a network with a 12-port switch?

Answers:

• 1

• 12

• 3

• 4

56. what factor determines the OSPF router ID.

Answers:

• The highest IP address of any Loop Back Interface

• The lowest IP address of any logical interface

• The lowest IP address of any physical interface.

• The highest IP address of any Physical Interface

57. Which of the following is a process of putting a packet for a destination network not having an entry in the routing table, on to the next hop router?

Answers:

• Static Routing

• Dynamic Routing

• Double Routing

• Default routing

58. What layer in the OSI model is responsible for data segmentation?

Answers:

• Data Link

• Physical

• Transport

• Network

59. If you wanted to delete the configuration stored in NVRAM, what would you type?

Answers:

• delete nvram

• erase nvram

• erase running

• erase startup

60. How does a bridge function?

Answers:

• It passes packets outside of its network segment if its IP address cannot be found on its table

• It maintains a table of the IP address of the host connected to its internet segment

• It looks up the frames destination in its address table and sends the frame towards the destination

• It maintains the table of the data link layer and network layer addresses for the host connected to its network segment

61. What is the role of a destination port number?

Answers:

• To track different conversations and distinct services.

• To address the network devices.

• To allow or forbid network access.

• To assign priorities to services.

62. Which router component stores routing tables, ARP cache, and packet buffers?

Answers:

• RAM

• ROM

• Flash memory

• NVRAM

63. Which of the following key factors are categorized as metrics?

Answers:

• Bandwidth

• All of these

• Hops

• Ticks

64. Which router command allows you to determine whether an IP access list is enabled on a particular interface?

Answers:

• show ip interface

• show access list

• show access interface

• show ip list

65. Your Ethernet network, 172.30.1.0, shuts down. Which update message is seen in your router's debug IP rip output regarding that network?

Answers:

• subnet 172.30.1.0, metric 16

• subnet 172.30.1.0, metric 0

• subnet 172.30.1.0, metric 15

• subnet 172.30.1.0, metric 1

66. A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20684570. Another route is from OSPF with a metric of 852. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?

Answers:

• the RIPv2 route

• the OSPF route

• the EIGRP route

• all three routes

• OSPF and RIPv2 routes

67. You want to verify the configuration register entry of a Cisco 2500 series router.  What command would you use on the router?

Answers:

• show running-config

• show register

• show version

• show flash

• show config-reg

68. During encapsulation in which order is information packaged?

Answers:

• Packet, Data, Segment, Frame

• Data, Packet, Segment, Frame

• Segment, Data, Packet, Frame

• Data, Segment, Packet, Frame

69. How many subnets and usable hosts are in the network 198.25.75.8.0/29?

Answers:

• 32 subnets, 8 hosts

• 128 subnets, 2 hosts

• 6 subnets, 32 hosts

• 6 subnets, 30 hosts

• 32 subnets, 6 hosts

70. What is the difference between a bridge and a switch?

Answers:

• A bridge is ASIC based and a switch is software based

• A bridge is RISC based and a switch is ASIC based

• A bridge is software based and a switch is CISC based

• A bridge is software based and a switch is ASIC based

71. Which command displays the interfaces using a given access list?

Answers:

• Show active list

• Show interface parameters

• Show access-list interfaces

• Show IP interface

• Configure IP access list

72. Which network mask should you place on a class C address to accommodate a user requirement for five networks with a maximum of 17 hosts on each network?

Answers:

• 255.255.255.224

• 255.255.255.192

• 255.255.255.240

• 255.255.255.248

73. Link Access Procedure, Balanced (LAPB), is the protocol designed to ensure that the frames are error-free and properly sequenced in what type of network?

Answers:

• None of these

• Internet

• X.25

• ARPANET

74. In the IPv6 address structure, how many bits are included in each field?

Answers:

• 64

• 128

• 24

• 4

• 16

75. The RSTP provides which new port role?

Answers:

• Enabled

• Discarding

• Disabled

• Forwarding

76. You work as a network technician for smarterer and are responsible for this network.  You have chosen WPA over WEP in the wireless network.  What is one reason why WPA is preferred over WEP?

Answers:

• A WPA key is longer and requires more special characters than the WEP key

• WPA key values remain the same until the client configuration is changed.

• The access point and the client are manually configured with different WPA key values

• The values of WPA keys can change dynamically while the system is used

77. What is an advantage of local area network LAN segmentation?

Answers:

• Elimination of broadcast

• Smaller collision domains

• Larger number of users within the same domain

• Decrease cost of implementation

78. A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing. OSPF has been configured on the router,as the routing protocol for the network. Which statement about this network is true?

Answers:

• Direct inter-vlan communication does not require OSPF.

• OSPF cannot be used if router-on-a-stick is configured on the router.

• For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.

• For the two vlans to communicate,a network statement for each subinterface needs to be added to the OSPF configuration.

79. Which attribute is unique to Cisco's implementation of BGP?

Answers:

• Local-Preference

• MED

• AS-Path

• Weight

80. For a window size of 3, the ack4 signal will say to send the _____ packet.

Answers:

• 2nd

• 3rd

• 4th

• None of these

81. True or False? MAC addresses are the feature of the physical layer.

Answers:

• True

• False

82. Which device is commonly used as Data Terminal Equipment?

Answers:

• Modem

• ISDN

• CSU/DSU

• router

83. A default Frame Relay WAN is classified as what type of physical network?

Answers:

• broadcast multi-access

• point-to-point

• broadcast point-to-multipoint

• nonbroadcast multi-access

• nonbroadcast multipoint

84. What PPP protocol provides for dynamic addressing, authentication, and multilink?

Answers:

• HDLC

• NCP

• X.25

• LCP

85. From the seven OSI layers, which layer is responsible for error recovery and reliability?

Answers:

• (all of these)

• Session

• Application

• Network layer

• Data-Link

86. What Protocol Does PPP use to identify the Network layer protocol?

Answers:

• X.25

• ISDN

• NCP

• LCP

87. If a router receives an OSPF external and EIGRP external route for the same prefix, which route will be installed in the routing table.

Answers:

• BOTH

• NONE

• OSPF

• Depends on the age of the route

• EIGRP

88. From which IP address class can 15 bits be borrowed to create subnets?

Answers:

• A

• C

• E

• B

• D

89. What does the term ‘Base’ refer to in 100BaseT?

Answers:

• Speed category

• Spectrum used

• Cabling type

• 100 mode type

• Signaling type

90. What is the purpose of Inverse ARP?

Answers:

• B. to map a known DLCI to a MAC address

• E. to map a known IP address to a SPID

• To map a known DLCI to an IP address

• C. to map a known MAC address to an IP address

• A. to map a known IP address to a MAC address

91. When you issue the command "Show Version," your router returns: “Configuration register is 0x0101” From where does the router boot?

Answers:

• FLASH

• A TFTP server

• NVRAM

• ROM

92. What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.)

Answers:

• 30

• 16

• It is an invalid subnet mask for the Network

• 32

• 14

93. What is the primary advantage of both bridging and switching?

Answers:

• Upper layer protocol transparency

• Bridging and switching have different advantages

• Lower layer protocol transparency

• Encryption

94. Three access points have been installed and configured to cover a small office.  What term defines the wireless topology?

Answers:

• BSS

• ESS

• IBSS

• SSID