CCNA 4 Routing & Switching Essentials Ver 6.0 – ITN Pretest Exam Answers

CCNA 4 Pretest Exam Answers

  1. Which statement describes a route that has been learned dynamically?

    It is identified by the prefix C in the routing table.
    It has an administrative distance of 1.
    It is automatically updated and maintained by routing protocols.*
    It is unaffected by changes in the topology of the network.

  2. Refer to the exhibit. Which switch will be the root bridge after the election process is complete?


  3. What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.)


  4. What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?

    source MAC address
    source IP address
    destination MAC address*
    destination IP address
    Ethernet type

  5. What are two reasons to implement passive interfaces in the EIGRP configuration of a Cisco router? (Choose two.)

    to provide increased network security*
    to shut down unused interfaces
    to exclude interfaces from load balancing
    to avoid unnecessary update traffic*
    to mitigate attacks coming from the interfaces

  6. Which two functions are primary functions of a router? (Choose two.)

    packet forwarding*
    flow control
    path selection*
    domain name resolution

  7. Which two devices allow hosts on different VLANs to communicate with each other? (Choose two.)

    Layer 3 switch*
    Layer 2 switch

  8. In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)

    electromagnetic interference*
    size of the network
    signal modulation technique

  9. Which information does a switch use to keep the MAC address table information current?

    the source MAC address and the incoming port*
    the source and destination MAC addresses and the incoming port
    the source MAC address and the outgoing port
    the destination MAC address and the outgoing port
    the source and destination MAC addresses and the outgoing port
    the destination MAC address and the incoming port

  10. The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?


  11. How does implementing STP allow for a scalable network design?

    It eliminates Layer 2 loops from redundant links.*
    It provides failover services when duplicate network equipment is used.
    It prevents local traffic from propagating to other parts of the network.
    It filters broadcasts and other undesirable traffic from the network.

  12. A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

    cell modem
    cable modem

  13. What is a characteristic of a default static route?

    It uses a single network address to send multiple static routes to one destination address.
    It backs up a route already discovered by a dynamic routing protocol.
    It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.*
    It is configured with a higher administrative distance than is the original dynamic routing protocol.

  14. Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.)

    dynamic desirable – dynamic auto*
    dynamic auto – dynamic auto
    access – trunk
    dynamic desirable – dynamic desirable*
    dynamic desirable – trunk*
    access – dynamic auto

  15. On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

    VLAN 1*
    vty 0
    console 0

  16. A network engineer has been tasked with connecting two large autonomous systems (AS) together over the Internet. Which routing protocol should be selected?


  17. An EIGRP router loses the route to a network. Its topology table contains two feasible successors to the same network. What action will the router take?

    The DUAL algorithm is recomputed to find an alternate route.
    The router uses the default route.
    The router will query neighbors for an alternate route.
    The best alternative backup route is immediately inserted into the routing table.*

  18. What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.)***

  19. Which two pieces of information are required when creating a standard access control list? (Choose two.)

    destination address and wildcard mask
    access list number between 1 and 99*
    access list number between 100 and 199
    source address and wildcard mask*
    subnet mask and wildcard mask

  20. Question as presented:

  21. Which criterion is preferred by the router to choose a router ID?

    the router-id rid command*
    the IP address of the highest configured loopback interface on the router
    the IP address of the highest active interface on the router
    the IP address of the highest active OSPF-enabled interface

  22. A network administrator is entering the command ipv6 unicast-routing to start configuring DHCPv6 operation on a router. Which statement describes the function of this command?

    It is required to configure stateless DHCPv6 server on the router.
    It is required to configure stateful DHCPv6 server on the router.
    It is required for sending ICMPv6 RA messages.*
    It is required for enabling DNS service in DHCPv6 configurations.

  23. What three services are provided by the transport layer? (Choose three.)

    encryption of data
    path determination
    bit transmission
    flow control*
    error recovery*
    connection establishment*
    data representation

  24. Which TCP/IP model layer is closest to the end user?

    network access

  25. When applied to a router, which command would help mitigate brute-force password attacks against the router?

    service password-encryption
    login block-for 60 attempts 5 within 60*
    exec-timeout 30
    banner motd $Max failed logins = 5$

  26. Which circumstance would result in an enterprise deciding to implement a corporate WAN?

    when its employees become distributed across many branch locations*
    when the enterprise decides to secure its corporate LAN
    when the network will span multiple buildings
    when the number of employees exceeds the capacity of the LAN

  27. A corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected?

    leased line connection
    site-to-site VPN over the Internet
    dial-up connection
    remote access VPN over the Internet*

  28. Which three statements are true about PPP? (Choose three.)

    PPP can only be used between two Cisco devices.
    PPP uses LCPs to agree on format options such as authentication, compression, and error detection.*
    PPP carries packets from several network layer protocols in LCPs.
    PPP uses LCPs to establish, configure, and test the data-link connection.*
    PPP can use synchronous and asynchronous circuits.*

  29. A network administrator is configuring a PPP link with the commands:

    R1(config-if)# encapsulation ppp
    R1(config-if)# ppp quality 70

    What is the effect of these commands?

    The NCP will send a message to the sending device if the link usage reaches 70 percent.
    The PPP link will not be established if more than 30 percent of options cannot be accepted.
    The LCP establishment phase will not start until the bandwidth reaches 70 percent or more.
    The PPP link will be closed down if the link quality drops below 70 percent.*

  30. What is the protocol that provides ISPs the ability to send PPP frames over DSL networks?


  31. Refer to the exhibit. All routers are successfully running the BGP routing protocol. How many routers must use EBGP in order to share routing information across the autonomous systems?


  32. Which three values or sets of values are included when creating an extended access control list entry? (Choose three.)

    destination subnet mask and wildcard mask
    source address and wildcard mask*
    source subnet mask and wildcard mask
    destination address and wildcard mask*
    access list number between 100 and 199*
    default gateway address and wildcard mask
    access list number between 1 and 99

  33. Which pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated?

    fog computing*
    application enhancement platform
    network connectivity
    data analytics

  34. What two protocols are supported on Cisco devices for AAA communications? (Choose two.)


  35. What guideline is generally followed about the placement of extended access control lists?

    They should be placed as close as possible to the source of the traffic to be denied.*
    They should be placed as close as possible to the destination of the traffic to be denied.
    They should be placed on the fastest interface available.
    They should be placed on the destination WAN link.

  36. What network monitoring tool copies traffic moving through one switch port, and sends the copied traffic to another switch port for analysis?


  37. Question as presented:

  38. Which type of QoS marking is applied to Ethernet frames?

    IP precedence

  39. Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior?

    debug output and packet captures
    network configuration files
    the network performance baseline*
    syslog records and messages

  40. Which feature sends simulated data across the network and measures performance between multiple network locations?

    IP SLA*

Notify of

Inline Feedbacks
View all comments