Home > ICND1v3 – New Questions Part 2

ICND1v3 – New Questions Part 2

Note: These new questions have not been classified into specific topics so please learn them separately.

Premium Member: You can test your knowledge with these questions first via these links:
+ Question 1 to 15
+ Question 16 to 30
+ Question 31 to 50
+ Question 51 to 70
+ Question 71 to 90
+ Question 91 to 110
+ Question 111 to 124

Question 1

Drag and drop the Ethernet types from the left onto the correct service descriptions on the right.

Ethernet_Types.jpg

 

Answer:

+ provides 100 Mbps over copper segments up to 100 meters long: 100Base-TX
+ provides 100 Mbps over fiber segments up to 412 meters long: 100Base-FX
+ provides 10 Gbps over copper segments up to 100 meters long: 10GBase-T
+ provides 1 Gbps over fiber segments up to 550 meters long: 1000Base-SX
+ provides 1 Gbps over fiber segments up to 10 kilometers long: 1000Base-LX
+ provides 1 Gbps over copper segments up to 100 meters long: 1000Base-T

Explanation

First we need to understand the meaning behind each Ethernet type. Let’s take an example with 100Base-FX:
+ 100: represents frequency in MHz (Mega Hertz) for which this cable is made. The greater the MHz, the greater speeds the cable can handle. In this example it is 100MHz. The 100 MHz speed translates to 100Mbit per second.
+ Base (in Ethernet standards): refers to the baseband signalling, which uses the entire bandwidth of the cable to transmit a single signal. Therefore only one communication channel is available at any given time. It is contradict to broadband which shares the bandwidth of the cable.
+ TX/FX: The “T” refers to “Twisted Pair” (pairs that are twisted) physical medium that carries the signal so all “BASE-T…” types are copper.. The “FX” means it’s a two strand fiber-optic cable and supports speeds up to 100 Mbps. Maximum length is usually up to two kms.

100Base-TX (sometimes referred as “T” only) is the IEEE standard that defines the requirement for sending information at 100Mbps on unshielded twisted-pair (UTP) cabling. It uses two of the four available pairs within the UTP cable. It is also called fast Ethernet. Maximum length of 100Base-TX cable is 100 meters.

100Base-FX is simply Fast Ethernet over fiber. The maximum length of any segment of fiber-optic cabling connecting a station (computer) to a hub is 412 meters.

+ SX refers to Short-wavelength laser. It is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber using a 770 to 860 nanometer, near infrared (NIR) light wavelength. The standard specifies a distance capability between 220 meters and 550 meters.
+ LX refers to Long-wavelength laser. 1000BASE-LX can run over both single mode fiber and multimode fiber with a distance of up to 10 km (for single mode fiber) and 3km (for multimode fiber).
+ ZX refers to extended-wavelength laser. 1000BASE-ZX can only run in single mode fiber. The maximum length can be up to 100km

-> The frequency (in MHz) can be used to eliminate wrong options easily. For the rest we have to remember the maximum distance to solve this question:

Maximum distance: T (TX) (100m) < FX (412m)< SX (220m to 550m) < LX (3km to 10km) < ZX (over 10km)

Question 2

Drag and drop the DHCP messages from the left into the correct sequence for a DHCP IP address request on the right.

DHCP_messages.jpg

 

Answer:

+ first: DHCPDISCOVER
+ second: DHCPOFFER
+ third: DHCPREQUEST
+ fourth: DHCPACK

Explanation

Remember this order of DHCP messages: DORA (Discover -> Offer -> Request -> Ack). For more information of how DHCP messages are exchanged, please read our DHCP tutorial.

Question 3

Drag and drop the descriptions of static routing or dynamic routing from the left onto the correct categories on the right.

Static_dynamic_routing.jpg

 

Answer:

Dynamic Routing:
+ able to use different routes depending on the current network topology
+ efficient as the network grows
+ less secure than other options for routing updates

Static Routing:
+ allows for highly secure routing updates
+ always uses the same route to the same destination
+ inefficient as the network grows

Question 4

You are configuring a default route on a Cisco router. Drag and drop the commands from the left into the correct sequence on the right. Not all commands are used.

Default_route.jpg

 

Answer:

+ first: enable
+ second: configure terminal
+ third: ip routing
+ fourth: ip route 0.0.0.0 0.0.0.0 10.20.20.1
+ fifth: exit

Question 5

Drag and drop the address blocks from the left onto the correct address types on the right.

IPv6_address_blocks.jpg

 

Answer:

+ global unicast: 2000::/3
+ link-local unicast: FE80::/10
+ multicast: FF00::/8
+ unique-local unicast: FC00::/8

Explanation

Below is the list of common kinds of IPv6 addresses:

Loopback address ::1
Link-local address FE80::/10
Site-local address FEC0::/10
Global address 2000::/3
Multicast address FF00::/8

Link-local addresses only used for communications within the local subnetwork (automatic address configuration, neighbor discovery, router discovery, and by many routing protocols). It is only valid on the current subnet. It is usually created dynamically using a link-local prefix of FE80::/10 and a 64-bit interface identifier (based on 48-bit MAC address).

Global (unicast) address is globally unicast address sent through the public Internet (equivalent to public IPv4 addresses).

Unique-local unicast (also known as Site-local address). They are analogous to IPv4’s private address classes.

Question 6

Drag and drop the show cdp commands from the left onto the output they generate on the right.

cdp_commands.jpg

 

Answer:

+ show cdp:
Global CDP information:
Sending CDP packets every 60 seconds
Sending a holdtime value of 180 seconds
Sending CDPv2 advertisements is enabled

+ show cdp traffic:
CDP counters:
Total packets output: 19, Input: 16
Hdr syntax: 0, Chksum error: 0, Encaps failed: 0
No memory: 0, Invalid packet: 0, Fragmented: 0
CDP version 1 advertisements output: 0. Input: 0
CDP version 2 advertisements output: 19, Input: 16

+ show cdp neighbor detail:

Device ID: R2
Entry address(es):
   IP address: 192.168.1.2 
Platform: Cisco 7206VXR, Capabilities: Router 
Interface: Ethernet1/1, Port ID (outgoing port): Ethernet1/1 
Holdtime: 174 
Version:
Cisco IOS Software, 7200 Software (C7200-ADVTPSERVICESK9-M),
   Version 12.4(2)T, RELEASE SOFTWARE(fc1)
Advertisement version: 2
Duplex: Half

+ show cdp neighbor ethernet1/1:

Capability Codes: R — Router, T - Trans Bridge, B — Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater

Device ID Local Interface Holdtime Capability Platform Port ID
 R2       Eth 1/1	    162	        R     7206VXR  Eth 1/1

Question 7

You are updating the IOS on a Cisco router. Drag and drop the tasks from the left into the correct sequence on the right.

Update_IOS.jpg

 

Answer:

Step 1: Ensure that the router and the FTP server have connectivity to one another
Step 2: Copy the IOS image to the router
Step 3: Validate that the correct IOS image is stored in NVRAM
Step 4: Verify that the configuration register and boot variable are set correctly on the router
Step 5: Save the running configuration of the router
Step 6: Reload the router

Explanation

According to https://www.cisco.com/c/en/us/support/docs/routers/3800-series-integrated-services-routers/49044-sw-upgrade-proc-ram.html, the following steps should be performed to upgrade a Cisco IOS software image:

Step 1: Select a Cisco IOS Software Image
Step 2: Download the Cisco IOS Software Image to the TFTP Server
Step 3: Identify the File System to Copy the Image
Step 4: Prepare for the Upgrade
Step 5: Verify that the TFTP Server has IP Connectivity to the Router (equivalent to our Step 1)
Step 6: Copy IOS Image to the Router (equivalent to our Step 2)
Step 7: Verify the Cisco IOS Image in the File System (equivalent to our Step 3)
Step 8: Verify the Configuration Register (equivalent to our Step 4)
Step 9: Verify the Boot Variable (equivalent to our Step 4)
Step 10: Save the Configuration and Reload the Router (equivalent to our Step 5 & 6)
Step 11: Verify the Cisco IOS Upgrade (Verify that the router runs with the proper image)

Question 8

Drag and drop the components of a standard IPv4 access list entry from the left into the correct sequence on the right.

ACL_standard.jpg

 

Answer:

+ component 1: access-list
+ component 2: 10
+ component 3: permit
+ component 4: 192.168.1.0
+ component 5: 0.0.0.255
+ component 6: log

Explanation

The full command is “access-list 10 permit 192.168.1.0 0.0.0.255 log”. It allows packets with source IP addresses in the range of 192.168.1.0/24 and creates a log message to the device console. The first packet that the access list inspects triggers the access list to log a message at the device console. Subsequent packets are collected over 5-minute intervals before they are displayed or logged. Log messages include information about the access list number, the source IP address of packets, the number of packets from the same source that were permitted or denied in the previous 5-minute interval, and whether a packet was permitted or denied.

Question 9

Drag and drop the VTP terms from the left onto the correct descriptions on the right.

VTP_terms.jpg

 

Answer:

+ enables the administrator to set the VTP version for all switches in the domain: VTP server mode
+ forwards VTP advertisements out of a trunk port: VTP transparent mode
+ operates without the ability to delete VLANs: VTP client mode
+ removes VTP information from unknown unicast traffic on the VLAN: VTP pruning
+ supports Ethernet VLANs only: VTP version 1

Explanation

VTPv1 & VTPv2 support VLANs 1 to 1000 only (which is called the Ethernet VLANs).

Question 10

A host is sending packets to a router. Drag and drop the steps in the packet-handling process from the left into the correct sequence on the right.

Packet_Handling_Process.jpg

 

Answer:

+ Step 1: The packet is created
+ Step 2: A frame encapsulates the packet
+ Step 3: The destination IP address is checked
+ Step 4: The frame is transmitted
+ Step 5: The packet is extracted from the frame
+ Step 6: The packet is forwarded to the exit interface

Explanation

Step 1 to 4 describe how the packet is sent from the host: At the host side, data is encapsulated from Layer 7 to Layer 1 so at Layer 3 the packet is created and at Layer 2, a frame encapsulate the packet. The destination IP address is checked before transmitting this frame to the router.

In step 5, the frame arrived to the router and the router extracts the frame to get the packet inside. Then finally the packet is forwarded to the suitable exit interface. Many steps were omitted between step 5 & 6 so it is difficult to understand this question.

Question 11

Drag and drop the OSI model layers from the left onto the correct TCP/IP model layers on the right.

OSI_vs_TCPIP.jpg

 

Answer:

+ application layer: session layer
+ internet layer: network layer
+ link layer: physical layer
+ TCP/UDP layer: transport layer

Explanation

The Internet Layer in TCP/IP Model is equivalent to the Network Layer of the OSI Model.

OSI_TCP_IP_Comparison.jpg

Question 12

Drag and drop the routing protocols from the left onto the default administrative distances on the right.

Default_Administrative_Distance.jpg

 

Answer:

+ 0: connected
+ 120: RIP
+ 1: static
+ 90: EIGRP
+ 110: OSPF

Question 13

Drag and drop the VLAN port membership modes from the left onto the correct descriptions on the right.

VLAN_port_membership.jpg

 

Answer:

+ manual configuration that allows the access port to belong to exactly one VLAN: static-access
+ allows the port to belong to one or more VLANs: trunk
+ allows the port to be assigned automatically to exactly one VLAN: dynamic-access
+ allows the port to support a single VLAN across a service-provider network: tunnel
+ configures the port to communicate only with a community port: private VLAN

Question 14

Drag and drop the IOS commands from a RIP router from the left onto the correct effects on the right.

RIP_commands.jpg

 

Answer:

+ configures the device to listen to broadcasts to learn routes: version 1
+ configures the device to listen to routes from both multicast and broadcast but does not send any: passive-interface
+ configures the device to send multicast updates: version 2
+ configures the device to send unicast route updates to a specific destination: neighbor
+ controls the number of routes to a specific destination that the device supports: maximum-paths
+ sets the route broadcast interval on the device: timers

Question 15

Drag and drop the DNS-lookup configuration commands from the left onto the correct effects on the right.

DNS_lookup_configuration.jpg

 

Answer:

+ adds an entry to the host table: ip host switch_1 192.168.0.1
+ completes the FQDN of the DNS server: ip domain-name
+ displays address-mapping information: show hosts
+ enables host-to-IP-address translation: ip domain-lookup
+ specifies the IP address of the DNS server: ip name-server

Explanation

The command “ip name-server <IP address>” specifies the address of one or more name servers.
The command “ip domain-name” defines a default domain name that is used to complete unqualified host names. For example, if we defines “ip domain-name 9tut.net” then a host3 queries to this router is known as host3.9tut.net.
The command “ip domain-lookup” enables DNS lookup feature (DNS-based host name-to-address translation). This command is enabled by default.

Reference: https://www.cisco.com/c/en/us/support/docs/ip/domain-name-system-dns/24182-reversedns.html

The command “ip host” defines a static hostname-to-address mapping in the hostname cache. For example if we define “ip host sw1 192.168.1.1” then we can ping to Sw1 with the command “ping sw1” (or telnet, traceroute… to it with the “telnet sw1”), which is easier to remember than the “ping 192.168.1.1” command.

The following example shows how to configure the DNS server lookup feature:
Switch(config)#ip domain-name 9tut
Switch(config)#ip name-server 192.1.0.1
Switch(config)#ip domain-lookup //Note: this command is enabled by default

Note: A fully qualified domain name (FQDN) is an unambiguous domain name that specifies the exact location in the Domain Name System’s tree hierarchy through to a top-level domain and finally to the root domain. Technically, a FQDN has a trailing dot. For example: router3.9tut.net

The “show hosts” command displays the cached DNS name servers and domain names. For example:

router# show hosts
Default domain is 9tut.net
Name/address lookup uses domain service
Name servers are 255.255.255.255
Host              Flags        Age(hr)   Type       Address(es)
host1.9tut.net   (temp, OK)    1         IP         192.168.1.10
abc              (perm, OK)    0         IP         10.0.0.0 10.0.0.2 10.0.0.3

Question 16

Drag and drop the logging types from the left onto the correct descriptions on the right. Not all logging types are used.

Logging_types.jpg

 

Answer:

+ deletes old log messages to prevent the RAM consumption from exceeding a specified limit: buffered logging
+ displays logs to users who are physically connected to the device: console logging
+ displays logs to users who are remotely connected to the device: terminal logging
+ exports logs to a remote device: syslog server logging

Explanation

Console logging: By default, the router sends all log messages to its console port. Hence only the users that are physically connected to the router console port can view these messages.

Terminal logging: It is similar to console logging, but it displays log messages to the router’s VTY lines instead. This is not enabled by default.

Buffered logging: This type of logging uses router’s RAM for storing log messages. Buffer has a fixed size to ensure that the log will not deplete valuable system memory. The router accomplishes this by deleting old messages from the buffer as new messages are added.

Syslog Server logging: The router can use syslog to forward log messages to external syslog servers for storage. This type of logging is not enabled by default.

Question 17

Refer to the exhibit. Drag and drop the TCP header fields from the left into the correct positions on the right.

tcp-header-field_columns.jpg

TCP_Header_Fields.jpg

 

Answer:

+ position A: source port
+ position B: destination port
+ position C: sequence number
+ position D : acknowledgement number
+ position E: checksum
+ position F: data

Explanation

tcp-header-fields-notation.jpg

Question 18

Drag and drop the logging configuration commands from the left onto the logging locations they configure on the right.

Logging_Commands.jpg

 

Answer:

+ syslog server: logging host
+ VTY session: terminal monitor
+ console: logging console
+ internal buffer: logging buffered

Explanation

Console logging: By default, the router sends all log messages to its console port. Hence only the users that are physically connected to the router console port can view these messages. If the console logging is disabled for some reasons, we can enable it again with the “logging console” command. By default, the console receives debugging messages and numerically lower levels. If we want to change the level, we can use the “logging console level” command.

The command “terminal monitor” helps logging messages appear on the your current terminal session.

Buffered logging: This type of logging uses router’s RAM for storing log messages. Buffer has a fixed size to ensure that the log will not deplete valuable system memory. The router accomplishes this by deleting old messages from the buffer as new messages are added.

Syslog Server (logging): The router can use syslog to forward log messages to external syslog servers for storage. This type of logging is not enabled by default.

Question 19

Drag and drop the DNS lookup commands from the left onto the correct effects on the right.

DNS_commands.jpg

Answer:

+ enable the DNS server on the device: ip name-server
+ specifies a sequence of domain names: ip domain-list
+ enable dns lookup on an individual interface: ip domain lookup source-interface
+ specifies the default domain to append to unqualified host name: ip domain-name
+ statically map on ip address to host name: ip host
+ identified a DNS server to provide lookup service: ip dns-server

Explanation

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dns/configuration/15-mt/dns-15-mt-book/dns-config-dns.html

Question 20

Drag and drop the DHCP client states from the left into the standard order in which the client passes through them on the right.

DHCP_Client_States.jpg

Answer:

initializing – first
selecting – second
requesting – third
bound (binding)– fourth
renewing – fifth
rebinding – sixth

Reference: https://technet.microsoft.com/en-us/library/cc958935.aspx

Question 21

Drag and drop the PDUs from the left onto the correct TCP/IP layers on the right.

OSI_PDU.jpg

 

Answer:

+ application layer: data
+ data link layer: frames
+ network layer: packets
+ physical layer: bits
+ transport layer: segments

Question 22

Drag and drop the route source codes in a routing table from the left onto the correct meanings on the right.

Route_source_codes.jpg

 

Answer:

+ directly connected network: C
+ manually configured static route: S
+ route learned dynamically by EIGRP: D
+ route learned dynamically by IGRP: I
+ route learned dunamically by IS-IS: i
+ route learned dynamically by OSPF: O

Explanation

The symbol of EIGRP routes is “D”, not “E” because “E” has been used for Exterior Gateway Protocol (EGP), which is the BGP predecessor. But the support for EGP has been removed since Cisco IOS 12.2T.

Question 23

Drag and drop the IEEE standard Cable names from the left onto the correct cable types on the right.

Cable_Types_3.jpg

Answer:

Copper:
+ 10BASE-T
+ 100BASE-TX
+ 10GBASE-T

Fiber:
+ 10GBASE-LR
+ 1000BASE-LX
+ 1000BASE-SC

Explanation

The “T” letter symbolizes for “twisted pair cable” so all “BASE-T…” types are copper.

Question 24

Drag and drop the benefits of a Cisco wireless Lan controller from the left onto the correct examples on the right.

Wireless_LAN_controller.jpg

 

Answer:

+ Access points automatically adjust their signal strength: Dynamic RF Feature
+ The controller image is deployed automatically to access points: Easy upgrade process
+ The controller provides centralized management of users and VLANs: Easy Deployment Process
+ The controller uses load balancing to maximize throughput: Optimized user performance

Question 25

Drag and Drop the protocols from the left onto the correct IP traffic types on the right.

TCP_UDP_Protocols.jpg

 

Answer:

TCP:
+ SMTP
+ Telnet
+ HTTP

UDP:
+ SNMP
+ DHCP
+ VoIP

Explanation

In this question we should remember that Simple Mail Transfer Protocol (SMTP) runs on TCP port because email is very important.

Question 26

Drag and drop the IPv6 addresses from the left onto the correct types on the right

IPv6_addresses.jpg

 

Answer:

+ Modified EUI-64: DB:FC:93:FF:FE:D8:05:0A
+ multicast: FF01::1
+ unicast: 2020:10D8:0:0:85:800:52:7348
+ unspecified: ::

Question 27

Drag and drop the values in a routing table from the left onto the correct meanings on the right

Routing_tables_values.jpg

 

Answer:

+ Administrative distance: indicator of the trustworthiness of the route
+ Destination network: remote network address
+ Metric: value used by the router to determine the preferred route
+ Next hop: network to which the router forwards packets on the associated route
+ Route source: code that indicates the method by which the router learned the route

Question 28

Drag and drop the switching concepts from the left onto the correct descriptions on the right.

MAC_Learning.jpg

 

Answer:

+ Dynamic MAC address: MAC that is learned by the switch through normal traffic
+ MAC ACL: feature that determines whether incoming traffic will be allowed
+ MAC address table: associates a learned MAC address with its connected interface
+ MAC learning: adding a previously unknown MAC into the address table
+ MAC aging: removing an inactive MAC after a specified time
+ Static MAC: MAC address that remains in the MAC address table after reboot

Question 29

Refer to the exhibit. Router R4 is reachable from Router R3. Which two scenarios would prevent the subnet 172.16.2.0/24 from being added to the routing table on router R3? (Choose two)

RIP_Routing_table.jpg

R3#show ip route
Gateway of last resort is not set
C  192.168.4.0/24 is directly connected, Ethernet1/2 
R  192.168.1.0/24 [120/1] via 192.168.3.1, 00:00:09, Ethernet1/0 
C  192.168.2.0/24 is directly connected, Ethernet1/1 
C  192.168.3.0/24 is directly connected, Ethernet1/0 
R3#ping 192.168.4.1 
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.4.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 64/66/68

A. Router R4 is running RIPv1 instead of RIPv2.
B. Network updates are looping around routers R1, R2, and R3.
C. The subnet uses a loopback interface.
D. Routers R3 and R4 are running different versions of RIP.
E. The subnet uses a classless network.
F. Router R3 has split horizon enabled.

 

Answer: A D

Explanation

Remember that RIPv2 device can understand RIPv1 device but not vice versa so:
+ If R3 runs RIPv1 and R4 runs RIPv2 then R3 cannot understand R4 so it ignores all RIPv2 updates sent from R4.
+ If R3 runs RIPv2 and R4 runs RIPv1 then R4 can only advertise major network 172.16.0.0/24 so R3 can only learn this major network, not the subnet 172.16.2.0/24 (-> Answer A is correct)

-> Answer D is correct.

Question 30

Which address scheme is used to route traffic to the public Internet?

A. 2000::/3
B. 172.30.1.024
C. FC007
D. 192.168.10.024

 

Answer: A

Explanation

All IPv6 global address starts with 2000::/3 so an IPv6 address must belong to this range to route on the public Internet.

Question 31

Which IP address is the broadcast address for subnet 172.16.0.0/19?

A. 172.16.0.255
B. 172.16.31.255
C. 172.16.32.255
D. 172.31.255.255

 

Answer: B

Explanation

Increment: 32 (/19 is 1110 0000 at 3rd octet)
Network address: 172.16.0.0
Broadcast address: 172.16.31.255

Question 32

Refer to the exhibit.

frame_rewrite_place.jpg

If host A is sending packets to host B, where does the Layer 2 frame rewrite occur?

A. on the router before it forwards the packet to host B
B. on host B when it receives the packet from the router
C. on the router when it receives the packet from host A
D. on host A before it sends the packet toward the router

 

Answer: A

Explanation

Before forwarding packet to Host B, router R1 needs to rewrite both the source & destination MAC address. The new source MAC would be the MAC address of the exiting interface of R1 and the new destination MAC address would be the MAC address of Host B.

Question 33

Which condition is most important to support the use of syslog messages for troubleshooting?

A. Messages are logged to a UNIX-based server.
B. The router has a large internal buffer space.
C. NTP is in use to ensure accurate timestamps.
D. Messages are logged to a Cisco UCS Server.

 

Answer: C

Explanation

We have to configure Network Time Protocol (NTP) so that each syslog message is recorded with the correct time which can help us to identify the problem more easily.

Question 34

Which value in a routing table entry represents the subnet mask?

A. prefix length
B. route source code
C. administrative distance
D. next-hop

 

Answer: A

Explanation

The prefix length in the routing table, for example: 192.168.1.0/24, helps us indicate the subnet mask (in this case /24 is equivalent to the subnet mask of 255.255.255.0).

Question 35

Which statement about port security is true?

A. It is not supported on private VLANs.
B. It can be configured on SPAN destination ports.
C. The default port security configuration allows for a maximum of 10 MAC addresses.
D. In sticky mode, the port retains dynamically-learned addresses during a link failure.

 

Answer: D

Explanation

The “sticky ” keyword (in the command switchport port-security mac-address sticky [MAC]) is used to make the MAC address appear in the running configuration so even if during a link failure, the port still retains the dynamically-learned addresses. But if we don’t save them (to the startup configuration) before rebooting, they will be lost.

Question 36

Which configuration register value do you enter on a device to bypass the startup configuration?

A. 0x2102
B. 0x2120
C. 0x2124
D. 0x2142

 

Answer: D

Explanation

By changing the configuration register to 0x2142, when that router reboots it will bypass the startup-config and no password is required.

Question 37

Which two DNS record types are currently supported? (Choose two)

A. NIL
B. A
C. MX
D. B
E. ACK

 

Answer: B C

Explanation

Commonly used record types:
+ A (Host address)
+ AAAA (IPv6 host address)
+ ALIAS (Auto resolved alias)
+ CNAME (Canonical name for an alias)
+ MX (Mail eXchange)
+ NS (Name Server)
+ PTR (Pointer)
+ SOA (Start Of Authority)
+ SRV (location of service)
+ TXT (Descriptive text)

Question 38

Which command can you enter to forward DHCP requests to a server on behalf of a client on a different network?

A. service dhcp
B. network 192.168.100.0 255.255.255.0
C. ip helper-address address
D. ip dhcp-pool pool_name

 

Answer: C

Explanation

If the DHCP Server is not on the same subnet with the DHCP Client, we need to configure the router on the DHCP client side to act as a DHCP Relay Agent so that it can forward DHCP messages between the DHCP Client & DHCP Server. To make a router a DHCP Relay Agent, simply put the “ip helper-address <IP-address-of-DHCP-Server>” command under the interface that receives the DHCP messages from the DHCP Client.

DHCP_Relay_Agent.jpg

Question 39

Which statement about device security is true?

A. A router can have a maximum of two passwords configured
B. The password you configure is encrypted in the running configuration by default
C. The enable password must be used before the enable secret password
D. If an encrypted password is lost, the NVRAM configuration must be ignored on boot

 

Answer: D

Explanation

NVRAM holds the router’s startup configuration file. Therefore if we forget the password of the device, we should ignored the NVRAM configuration on boot. We usually do this by changing the configuration register to 0x2142.

Question 40

Which option can be used in case a backup route is required in the routing table?

A. floating static route
B. No extra configuration is required.
C. next hop
D. route distribution

 

Answer: A

Explanation

Floating static routes are static routes that have an administrative distance greater than the administrative distance (AD) of another static route or dynamic routes. By default a static route has an AD of 1 then floating static route must have the AD greater than 1. Floating static route has a manually configured administrative distance greater than that of the primary route and therefore would not be in the routing table until the primary route fails.

Question 41

Which two features are supported with SLAAC? (Choose two)

A. Duplicate IPv6 addresses are detected.
B. The first 64 bits of a device IPv6 address can be calculated automatically from its MAC address.
C. IPv6 address have an infinite lifetime by default.
D. Router advertisements can track lifetime timers.
E. Globally-routed paths are preferred over equal-cost link-local paths.

 

Answer: A D

Explanation

IPv6 stateless address autoconfiguration (SLAAC) is the native IPv6 method used to provide end hosts with IPv6 address and default gateway information dynamically without requiring DHCPv6 address allocation.

Stateless Address Auto-Configuration (SLAAC) is configured as follows:
+ Host sends a router solicitation message.
+ Hosts waits for a Router Advertisement message.
+ Hosts take the first 64 bits of the IPv6 prefix from the Router Advertisement message and combines it with the 64 bit EUI-64 address (in the case of ethernet, this is created from the MAC Address) to create a global unicast message (-> Answer B is not correct). The host also uses the source IP address, in the IP header, of the Router Advertisement message, as its default gateway.
+ Duplicate Address Detection is performed by IPv6 clients in order to ensure that random addresses that are picked do not collide with other clients.
+ The choice of algorithm is up to the client and is often configurable.

Reference: https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3se/consolidated_guide/b_consolidated_3850_3se_cg_chapter_0101011.html

The Router Lifetime field in the Router advertisement (RA) can track lifetime timers.

Question 42a

Which IPv4 address type is used to communicate with all hosts on a subnet?

A. broadcast
B. link-local
C. anycast
D. multicast

 

Answer: A

Question 42b

Which IPv4 address type can reach each node on a network?

A. unicast
B. anycast
C. broadcast
D. multicast

 

Answer: C

Question 43

Which VLAN ID is reserved?

A. 1
B. 1002
C. 1006
D. 4094

 

Answer: B

Explanation

VLANs 1002-1005 are default VLANs for FDDI & Token Ring. They are reserved and cannot be deleted or used for Ethernet.

show_vlan.jpg

Question 44

An administrator is in the process of changing the configuration of a router. What command will allow the administrator to check the changes that have been made prior to saving the new configuration?

A. Router# show startup-config
B. Router(config)# show running-config
C. Router# show running-config
D. Router# show running-config changes

 

Answer: C

Question 45

Which step is needed to configure SSH on a switch?

A. Configuring an IP domain name.
B. Configuring RSTP.
C. Configuring an SNMP community string.
D. Configuring Telnet on a VTY line.

Answer: A

Explanation

There are four steps required to enable SSH support on a Cisco IOS router:
1. Configure the hostname command.
2. Configure the DNS domain.
3. Generate the SSH key to be used.
4. Enable SSH transport support for the virtual type terminal (vtys).

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-ssh/4145-ssh.html

Question 46a

You attempt to ping a remote device by name from a PC, and the ping operation fails and returns the error message “Ping request could not find host.” You verify that the router DHCP pool is configured with a name server. What are two possible reasons for the problem? (Choose two)

A. The DNS server is not reachable.
B. The PC network interface card device driver is missing.
C. The host that must be resolved does not exist.
D. The subnet mask of the DHCP pool is incorrect.
E. The DHCP server cannot provide an address to the PC.

 

Answer: A C

Explanation

As we ping by name so a valid DNS server is required. Therefore if we cannot ping to the destination device then maybe either the DNS server or the remote device was down/unreachable.

Question 46b

Refer to the exhibit.

% Unrecognized host or address, or protocol not running

You ping a remote device by name from a router, and the ping operation returns this response. What are two reasons for this problem? (Choose two)

A. An ACL on the router blocked the ping.
B. A firewall blocked the ping.
C. The DNS server database does not include a record for the name.
D. The router is blacklisted by the DNS server.
E. Only one DNS server is configured on the router.

Answer: C D

Question 47

Which value does an IPv6 host use to create an EUI-64?

A. the MAC address
B. the OSPFv6 router ID
C. the IPv6 address
D. the IPv4 address

 

Answer: A

Explanation

Extended Unique Identifier (EUI) allows a host to assign itself a unique 64-Bit IPv6 interface identifier (EUI-64). This feature is a key benefit over IPv4 as it eliminates the need of manual configuration or DHCP as in the world of IPv4. The IPv6 EUI-64 format address is obtained through the 48-bit MAC address. The MAC address is first separated into two 24-bits, with one being OUI (Organizationally Unique Identifier) and the other being NIC specific. The 16-bit 0xFFFE is then inserted between these two 24-bits for the 64-bit EUI address. IEEE has chosen FFFE as a reserved value which can only appear in EUI-64 generated from the an EUI-48 MAC address.

For example, suppose we have the MAC address of C601.420F.0007. It would be divided into two 24-bit parts, which are “C60142” (OUI) and “0F0007” (NIC). Then “FFFE” is inserted in the middle. Therefore we have the address: C601.42FF.FE0F.0007.

Then, according to the RFC 3513 we need to invert the Universal/Local bit (“U/L” bit) in the 7th position of the first octet. The “u” bit is set to 1 to indicate Universal, and it is set to zero (0) to indicate local scope.

Therefore with the subnet of 2001:DB8:0:1::/64, the full IPv6 address is 2001:DB8:0:1:C601:42FF:FE0F:7/64

Question 48

Which protocol does a Cisco IP phone use to identify the voice VLAN?

A. CDP
B. LDAP
C. SIP
D. COS

 

Answer: A

Explanation

Cisco IP phones use Cisco Discovery Protocol (CDP) to know which VLANs to use.
Note: Voice vlan is just an ordinary VLAN. But in access port configuration you can specify that voice VLAN is exactly for voice traffic.

Question 49

You ping a remote device by name from a router, and the router you are using immediately displays a new prompt. What are two possible reasons for the problem? (Choose two)

A. The IP address of the remote device is listed in multiple ip host statements in the router configuration.
B. The ACL on the router blocked the ping.
C. The DNS server configuration on the router is missing.
D. The DNS server is unreachable.
E. The no ip domain-lookup command is configured on the router.

 

Answer: C E

Question 50

Which three statements about a meshed topology are true? (Choose three)

A. Every core device is connected to a distribution device.
B. Each access switch must be connected to at least one upstream distribution device and at least one core device.
C. Each distribution device is connected to exactly one core device.
D. Each access switch must be connected to exactly one upstream distribution device.
E. Every upstream distribution device is connected to an access switch.
F. Each access switch must be connected to at least two upstream distribution devices.

 

Answer: A E F

Explanation

This question wants to mention about hierarchical and meshed topology. Such a topology is shown below:

meshed_topology.jpg

Note: Hierarchical network design has three layers: core, distribution, and access

Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/HA_campus_DG/hacampusdg.html

Question 51

Which two fields are included in an Ethernet header? (Choose two)

A. source MAC address
B. destination IP address
C. payload
D. Ether Type
E. source IP address

 

Answer: A D

Explanation

Below is the Ethernet frame format which includes source MAC address and (Ether) type:

Ethernet802.3_Frame_Format.jpg

Question 52

Refer to the exhibit.

DHCP_Relay_Agent.jpg

Which interface must be configured as the DHCP relay agent so that host A can receive an IP address from the DHCP server?

A. 1
B. 2
C. 3
D. 4
E. 5

 

Answer: C

Explanation

If the DHCP Server is not on the same subnet with the DHCP Client, we need to configure the router on the DHCP client side to act as a DHCP Relay Agent so that it can forward DHCP messages between the DHCP Client & DHCP Server. To make a router a DHCP Relay Agent, simply put the “ip helper-address <IP-address-of-DHCP-Server>” command under the interface that receives the DHCP messages from the DHCP Client.

DHCP_Relay_Agent.jpg

Question 53

Which two network device types perform the translation of internal IP addresses to external IP addresses? (Choose two)

A. ACS
B. routers
C. bridges
D. WLCs
E. firewalls

 

Answer: B E

Question 54

Which two fields are used in TCP and UDP headers? (Choose two)

A. urgent pointer
B. ACK number
C. checksum
D. length
E. padding

 

Answer: C D

Explanation

The TCP and UDP headers are shown below:

TCP_Header.jpg

UDP_Header.jpg

As we can see, the UDP header is very simple with only 4 fields: source port, destination port, length and checksum. The two last fields also present in TCP headers. In which the length field is the size (in bytes) of the UDP header and the encapsulated data.

Question 55

Which two statements about access ports are true? (Choose two)

A. They can act as a host and a trunk port simultaneously
B. They forward all 802.1Q packets to trunk ports
C. An individual access port can transmit traffic for only one data VLAN
D. Each individual access port can support multiple data VLANs
E. They are assigned to VLAN 1 by default

 

Answer: C E

Question 56

You recently applied a common configuration to several PCs on different VLANs. The PCs are connected to the same switch with a router-on-a-stick, but users report that the PCs cannot ping one another. Which two are possible reasons for the problem? (Choose two)

A. The access ports on the PCs are misconfigured.
B. The native VLAN on the router is misconfigured.
C. The ip default-network command is misconfigured on the router.
D. The trunking protocol is configured incorrectly on the router subinterfaces.
E. The VLAN is configured incorrectly on the router subinterfaces.

 

Answer: A E

Question 57

Refer to the exhibit.

switch-A#show mac address-table
           MAC Address Table
----------------------------------------
Vlan	Mac Address	Type	Ports
----	-----------	------- --------
   1	0000.0000.0001	DYNAMIC	Fa0/1
Total Mac Addresses for this criterion: 1

If switch-A receives a frame with destination MAC address 0000.0000.0001 on its Fa0/1 interface, how does it process the frame?

A. It holds the packet until MAC address timer expires and then drops the frame.
B. It forwards the frame back out of interface Fa0/1.
C. It floods the frame to all interfaces except Fa0/1.
D. It drops the frame immediately.

 

Answer: D

Explanation

In brief, the basic switching function at Layer 2 adheres to these rules for determining forwarding responsibility:
+ If the destination MAC address is found in the CAM table, the switch sends the frame out the port that is associated with that destination MAC address in the CAM table. This process is called forwarding.
+ If the associated port to send the frame out is the same port that the frame originally came in on, there is no need to send the frame back out that same port, and the frame is ignored. This process is called filtering.
+ If the destination MAC address is not in the CAM table (that is, unknown unicast), the switch sends the frame out all other ports that are in the same VLAN as the received frame. This is called flooding. It does not flood the frame out the same port on which the frame was received.
+ If the destination MAC address of the received frame is the broadcast address (FFFF.FFFF.FFFF), the frame is sent out all ports that are in the same VLAN as the received frame. This is also called flooding. The only exception is the frame is not sent out the same port on which the frame was received.

Reference: http://www.ciscopress.com/articles/article.asp?p=2348264

In the output, switch A learned that the device with MAC address of 0000.0000.0001 is attached to port Fa0/1. But the switch receives a frame with the same destination MAC address from port Fa0/1 so the switch will filter out (drop) this frame.

Question 58

Which two statements about prefixes in a routing table are true? (Choose two)

A. The router prefers longer prefixes over shorter prefixes.
B. The router prefers prefixes that have more bit positions for the host than for the network.
C. The router prefers the prefix that includes the most 1 bits in the subnet mask.
D. The router prefers shorter prefixes over longer prefixes.
E. The router prefers the prefix that includes the most 0 bits in the subnet mask.

 

Answer: A C

Explanation

Suppose there are three routes in our routing table:

router# show ip route
....
D   192.168.32.0/26 [90/25789217] via 10.1.1.1
R   192.168.32.0/24 [120/4] via 10.1.1.2
O   192.168.32.0/19 [110/229840] via 10.1.1.3
....

If a packet arrives on a router interface destined for 192.168.32.1, which route would the router choose? It depends on the prefix length, or the number of bits set in the subnet mask. Longer prefixes are always preferred over shorter ones when forwarding a packet.

In this case, a packet destined to 192.168.32.1 is directed toward 10.1.1.1, because 192.168.32.1 falls within the 192.168.32.0/26 network (192.168.32.0 to 192.168.32.63). It also falls within the other two routes available, but the 192.168.32.0/26 has the longest prefix within the routing table (26 bits verses 24 or 19 bits).

Likewise, if a packet destined for 192.168.32.100 arrives on one of the router’s interfaces, it’s forwarded to 10.1.1.2, because 192.168.32.100 doesn’t fall within 192.168.32.0/26 (192.168.32.0 through 192.168.32.63), but it does fall within the 192.168.32.0/24 destination (192.168.32.0 through 192.168.32.255). Again, it also falls into the range covered by 192.168.32.0/19, but 192.168.32.0/24 has a longer prefix length.

Reference: https://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-routing-protocol-eigrp/8651-21.html

-> This is called “longest prefix match” rule so answer A is correct.

Answer C has the same meaning as “the most 1 bits in the subnet mask” means “longer prefix”

Question 59

Which two attributes of a packet change at every router along the path from source to destination? (Choose two)

A. destination IP address
B. source MAC address
C. packet MTU
D. source IP address
E. destination MAC address

 

Answer: B E

Explanation

When a packet is sent from a source to a destination, only the source & destination MAC addresses are changed on each segment while the source & destination IP addresses remain unchanged.

Question 60

Refer to the exhibit.

frame_rewrite_place.jpg

If Host A pings Host B, which statement about the ping is true?

A. The router looks up the destination IP network of the ping in its MAC address table
B. Host A encapsulates the packet within a frame before sending it
C. The ping packet includes both the destination MAC address and the source address
D. Host A sends the packet one byte at a time

 

Answer: B

Explanation

The router will check the destination IP network in its routing table -> Answer A is not correct.
The ping packet from host A will include: the source IP address of host A, the destination IP address of host B; the source MAC address of host A and the destination MAC address of the inbound interface of R1 -> Answer C is not correct.

When we make a ping from a Windows OS host, each ping packet is 32 bytes but if we ping from a Linux OS host, each ping packet is 64 bytes so it depends on the Operating System (OS) of the host. But each ping packet is surely larger than one byte -> Answer D is not correct.

Question 61

Which statement about port security on a trunk link is true?

A. It error-disables the port after 10 MAC addresses are statically configured
B. It is not supported
C. By default, it shuts down the port if it learns more than one MAC address
D. When it is enabled, it disables the native VLAN configuration

Answer: C

Explanation

Although some online Cisco documents say that “A secure port cannot be a trunk port” (like this document) but some say “Trunk port security extends port security to trunk ports” (like this document) so we decided to test on a Cisco switch version 15.1 and had this result:

port_security_trunk.jpg

So we can configure port-security on a trunk port and the maximum MAC addresses allowed is 1 and the violation mode is “Shutdown” by default. Therefore it will shutdown the port if it learns more than one MAC address.

Question 62

Which component of an Ethernet frame supports error detection?

A. EtherType
B. frame check sequence
C. 802.1Q tag
D. preamble

 

Answer: B

Explanation

At the end of each frame there is a Frame Check Sequence (FCS) field. FCS can be analyzed to determine if errors have occurred. FCS uses cyclic redundancy check (CRC) algorithm to detect errors in the transmitted frames. Before sending data, the sending host generates a CRC based on the header and data of that frame. When this frame arrives, the receiving host uses the same algorithm to generate its own CRC and compare them. If they do not match then a CRC error will occur.

Ethernet802.3_Frame_Format.jpg

Question 63

Which two statements about administrative distance are true? (Choose two)

A. The metric is used to determine which administrative distance is selected from the routing table.
B. The metric is calculated independently of the administrative distance.
C. It identifies the routing protocol priority.
D. It identifies the metric used for path calculation.
E. The metric uses the administrative distance to calculate a path.

 

Answer: B C

Explanation

The administrative distance (AD) of a routing protocol is fixed while the metric of each routing protocol is calculated based on some parameters (for example in RIP it is the hop count, in OSPF it is the bandwidth…) -> Answer B is correct.

The lower the AD, the higher priority of the routing protocol. For example, EIGRP (AD of 90) is always preferred to OSPF (AD of 110).

Question 64

Which two IPv6 multicast groups are joined when an IPv6 address is configured on an interface? (Choose two)

A. FF02::2
B. 2002::5
C. FF80::6
D. FF80::5
E. FF02::1

 

Answer: A E

Explanation

Every device automatically joins the all nodes (FF02::1) and solicited-node (FF02::1:FFxx:xxxx) multicast groups. The all-node group is used to communicate with all interfaces on the local link, and the solicited-nodes multicast group is required for link-layer address resolution. Routers also join a third multicast group, the all-routers group (FF02::2).

Reference: IP Routing on Cisco IOS, IOS XE, and IOS XR: AN Essential Guide to Understanding and Implementing IP Routing Protocols

These addresses are equivalent to IPv4 well-known multicast addresses in the range 224.0.0.0 to 239.255.255.255

Question 65

Which command do you enter to assign all untagged packets on a trunk to VLAN 999?

A. switchport trunk pruning vlan add 999
B. switchport trunk allowed vlan 999
C. switchport trunk native vlan 999
D. swtichport trunk allowed vlan add 999

 

Answer: C

Explanation

By default the native VLAN is 1 but we can assign a new native VLAN by the command “switchport trunk native vlan <vlan-id>”.

Question 66

Which two commands must you apply to a router to configure it as a router-on-a-stick? (Choose two)

A. spanning-tree portfast
B. encapsulation
C. vtp domain
D. vtp transparent
E. ip address

 

Answer: B E

Explanation

An example of how to configure a router-on-a-stick at router side is shown below:

R1(config)#int fa0/0
R1(config-if)#no ip address
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config)#int fa0/0.10
R1(config-subif)#encapsulation dot1q 10 //Configure dot1q encapsulation for VLAN 10 on sub-interface fa0/0.10
R1(config-subif)#ip address 192.168.1.0 255.255.255.0
R1(config-subif)#no shutdown
R1(config)#int fa0/0.20
R1(config-subif)#ip address 192.168.2.0 255.255.255.0
R1(config-subif)#no shutdown

Question 67

How does an access port configured for VLAN 10 handle an incoming packet with an 802.1q tag for VLAN 2?

A. It drops the packet.
B. It dynamically configures the port to accept traffic on VLAN 2.
C. It adds VLAN 2 to the VLAN database.
D. It forwards the packet to a port on VLAN 2.
E. It processes the packet and places it in a queue for future delivery.

 

Answer: A

Question 68

In which network topology does each network device have a direct physical connection to every other device?

A. point-to-multipoint
B. mesh
C. bus
D. star

 

Answer: B

Explanation

Full-mesh is a network topology in which there is a direct link between all pairs of nodes. Below is an example of full-mesh topology.

wan_full_mesh.jpg

Question 69

Which two statements about IPv6 SLAAC are true? (Choose two)

A. The default gateway of the host is configured during the SLAAC process
B. It is incompatible with DHCP
C. The host uses the EUI-64 algorithm to calculate the first 64 bits of the destination IPv6 address from the MAC address
D. It has a built-in mechanism to identify duplicate IP addresses on the network
E. The host sends a router advertisement message to begin the SLAAC process

 

Answer: A D

Explanation

IPv6 stateless address autoconfiguration (SLAAC) is the native IPv6 method used to provide end hosts with IPv6 address and default gateway information dynamically without requiring DHCPv6 address allocation.

Stateless Address Auto-Configuration (SLAAC) is configured as follows:
+ Host sends a router solicitation message.
+ Hosts waits for a Router Advertisement message.
+ Hosts take the first 64 bits of the IPv6 prefix from the Router Advertisement message and combines it with the 64 bit EUI-64 address (in the case of ethernet, this is created from the MAC Address) to create a global unicast message (-> Answer B is not correct). The host also uses the source IP address, in the IP header, of the Router Advertisement message, as its default gateway.
+ Duplicate Address Detection is performed by IPv6 clients in order to ensure that random addresses that are picked do not collide with other clients.
+ The choice of algorithm is up to the client and is often configurable.

Reference: https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3se/consolidated_guide/b_consolidated_3850_3se_cg_chapter_0101011.html

Question 70

In which two scenarios do you implement private IPv4 IP addresses? (Choose two)

A. on the webmail portal of an organization
B. on the connection that a mobile device uses for application updates
C. to connect network equipment between different IDFs
D. for the VPN solution that end users use to connect to the local network
E. on an application server that connects to a local database server

Answer: C E

Explanation

In general, private IPv4 addresses are suitable for applications/connections that do not need to go to the Internet.

The intermediate distribution frames (IDF) refers to the switches in the access layer which provide connection in a building so they don’t need to use public IPv4 address to go to the Internet -> Answer C is correct.

Question 71

Which two ACL types support IP Access List Entry Sequence Numbering? (Choose two)

A. named
B. reflexive
C. firewall
D. dynamic
E. standard

 

Answer: A E

Explanation

The IP Access List Entry Sequence Numbering feature allows you to apply sequence numbers to permit or deny statements as well as reorder, add, or remove such statements from a named IP access list. The IP Access List Entry Sequence Numbering feature makes revising IP access lists much easier. Prior to this feature, you could add access list entries to the end of an access list only; therefore, needing to add statements anywhere except at the end of a named IP access list required reconfiguring the entire access list.

For example, we can resequence a standard/extended access list like this:

Device(config)# ip access-list resequence MYACCESSLIST 100 15 //resequence the MYACCESSLIST, starting from 100 and increment 15

After this command the “MYACCESSLIST” ACL will be like this:

R1#show access-list
Standard IP access list MYACCESSLIST
100 permit ip host xxxx host xxxxx
115 permit ip host xxxx host xxxxx
130 permit ip host xxxx host xxxxx
145 permit ip host xxxx host xxxxx
160 permit ip host xxxx host xxxxx
175 permit ip host xxxx host xxxxx
190 permit ip host xxxx host xxxxx

We can use The IP Access List Entry Sequence Numbering feature in standard, extended and named ACL.

Question 72

Which command can you enter in ROMmon to bypass the password in the router startup configuration?

A. confreg 0x2142
B. configure terminal
C. config-register 0x2102
D. reset

 

Answer: A

Question 73

For which reason is a DHCP client unable to reach a host in different subnet?

A. The client and its gateway router have been assigned different subnet masks.
B. The client has been configured with only one DNS server.
C. DNS lookup has been disabled on the gateway router.
D. The client is connected to a switch in the same VLAN as its gateway router.

 

Answer: A

Question 74

Which command or command sequence do you enter to install a default route into a router that is configured with the no ip routing command?

A. ip route 0.0.0.0 0.0.0.0
B. router rip ip default-gateway
C. ip default-network
D. ip default-gateway

 

Answer: D

Explanation

When using the “no ip routing” command, a router will function like a host so we cannot perform routing function on it. We can only use the “ip default-gateway <IP address>” command to assign a default gateway for it (same as the default gateway in a host).

Question 75

Refer to the exhibit.

show ip route
192.168.1.0/24 is variably subnetted, 2 subnets, 2 masks

Router R1 produced this partial output running on a current IOS. Which two statements about R1 and its network environment are true? (Choose two)

A. R1 has a combination of local and connected routes totaling two subnets.
B. R1 has learned a maximum of four networks via routing protocols.
C. R1 has a maximum of two connected subnets including local route.
D. R1 has learned at least one network via routing protocols.
E. R1 has a network environment that supports a maximum of 16 hosts.

 

Answer: C D

Question 76

Under which circumstance should a network administrator implement only outgoing NAT towards an ISP?

A. when traffic that originates inside the network must be routed to internal hosts
B. when the network has few public IP addresses and many private IP addresses that require outside access
C. when the network must route UDP traffic
D. when traffic that originates outside the network must be routed to internal hosts

 

Answer: B

Question 77

Which two syslog configuration commands do you use to log warnings to the syslog server? (Choose two)

A. logging trap level informational
B. logging trap level alerts
C. logging trap level notice
D. logging trap level critical
E. logging trap level error

 

Answer: A C

Question 78

Which three values must you specify to resequence an IP access list? (Choose three)

A. access list name
B. increment
C. starting sequence number
D. interface
E. dynamic access list number
F. ending sequence number

 

Answer: A B C

Question 79

For which two reasons might you choose to configure dynamic routing instead of static routing on a router? (Choose two)

A. The router is part of a stub network.
B. The router needs access only to a single default route.
C. Dynamic routing requires less router configuration throughout the network than static routing.
D. The network is growing intermittently.
E. Dynamic routing updates are more secure than static routing updates.

 

Answer: C D

Question 80

All protocols on a network are using their default administrative distances with no redistribution. In which two different ways can you modify them so that OSPF and RIPv2 learned routes are preferred over EIGRP-learned routes? (Choose two)

A. Change the OSPF administrative distance to 5.
B. Change the RIP administrative distance to 70.
C. Change the EIGRP administrative distance to 70.
D. Change the RIP administrative distance to 100.
E. Change the EIGRP administrative distance to 100.

 

Answer: A B

Question 81

Which two characteristics of plenum cable are true? (Choose two)

A. It is more fire-resistant than nonplenum cable.
B. It can be installed above a drop-down ceiling without additional safety precautions.
C. It is less fire-resistant than nonplenum cable.
D. When it burns, it may release more toxins than nonplenum cable.
E. It requires additional safety precautions when installed above a drop-down ceiling.

 

Answer: A B

Question 82

Which statement about wireless access points is true?

A. They are Layer 2 devices that are used to extend a LAN to wireless clients.
B. They provide full duplex connectivity to host devices.
C. They are used as routers between LANs in a wireless network.
D. They are used to physically connect host devices to the wireless network.

 

Answer: A

Question 83

Which option is the default time zone used on Cisco devices?

A. CST
B. UTC
C. EST
D. GMT
E. PST

Answer: B

Question 84

Which circumstance causes a security violation on a switch port with port security enabled?

A. The maximum number of secure MAC addresses is reached on a secure port and an unidentified MAC address attempts an ingress connection.
B. A configured MAC address attempts an ingress connection on a different port in a different VLAN.
C. The minimum number of secure MAC addresses is configured on a secure port and an unidentified MAC address attempts an ingress connection.
D. A minimum number of secure MAC addresses has filled the dynamic table.

 

Answer: A

Question 85

You have configured two hosts that are connected to a single switch, but reside in different VLANs. Which statement about the configuration is true?

A. The two hosts are unable to communicate without a router.
B. The two hosts can communicate with ICMP.
C. The two hosts are unable to communicate without a trunk port.
D. The two hosts are unable to communicate without a hub.

 

Answer: A

Question 86

Which type of route is the most trusted?

A. BGP
B. OSPF
C. static
D. connected

 

Answer: D

Question 87

Which statement about the enable password is true?

A. The space character is not supported.
B. It is not stored in a secured format.
C. It can be up to 32 characters long.
D. It is stored in a secured format.

 

Answer: B

Question 88

For what reason do you use a standard access list?

A. to filter traffic from identified source addresses
B. to deny traffic to identified destination addresses
C. to load-balance traffic over different interfaces
D. to identify traffic to be label-switched through the network
E. to deny traffic to unidentified destination addresses

 

Answer: A

Question 89

How does a switch handle a frame in which it detects an error in the frame check sequence?

A. It updates the frame check sequence and forwards the frame to its destination.
B. It discards the damaged frame without further action.
C. It forwards the frame to its destination unchanged.
D. It discards the damaged frame and requests the sender to retransmit it.

 

Answer: B

Question 90

Which static route can be used to forward a packet that is destined to 192.168.1.23?

A. ip route 192.168.1.16 255.255.255.252 192.168.255.1
B. ip route 192.168.1.0 255.255.255.240 192.168.255.1
C. ip route 192.168.0.0 255.255.255.0 192.168.255.1
D. ip route 192.168.1.20 255.255.255.252 192.168.255.1

 

Answer: D

Question 91

If a router receives a route 192.168.1.0/24 from peers running OSPF and EIGRP, how does the router forward traffic destined to that network?

A. It uses the path with the lowest metric.
B. It always uses the path learned from OSPF because OSPF is a vendor-neutral protocol.
C. It load-balances traffic across both paths.
D. It always uses the path learned from EIGRP because EIGRP has a lower administrative distance.

 

Answer: D

Question 92

Which statement about a router on a stick is true?

A. It requires encapsulation to be configured on subinterfaces.
B. It requires encapsulation to be configured on the main interface.
C. The VLAN tag is randomly assigned as a frame exists the interface.
D. A single VLAN can traverse the link.

 

Answer: A

Question 93

Which IPv6 address does a device use for neighbor discovery?

A. the link-local address
B. the multicast address
C. the unique local address
D. the global unicast address

 

Answer: A

Question 94

How are MAC addresses removed from a MAC address table?

A. They are removed automatically if they remain inactive for the duration of the switch aging timer.
B. They are removed automatically on a FIFO basis when the address-table limit has been reached.
C. They must be manually cleared from the table.
D. They are removed automatically if they remain inactive for the duration of the global MAC address timer.

 

Answer: D

Question 95

Which two statements are true about the operation of a full-duplex Ethernet network? (Choose two)

A. There are no collisions in full-duplex mode.
B. A dedicated switch port is not required for each full-duplex node.
C. Ethernet hub ports are preconfigured for full-duplex mode.
D. The device network card and the switch port must be capable of operating in full-duplex mode.
E. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.

 

Answer: A D

Question 96

Which value represents a host route?

A. 192.168.1.0/30
B. 192.168.1.0/24
C. 192.168.1.2/31
D. 192.168.1.0/32

 

Answer: D

Question 97

Which Cisco IOS feature can dynamically assign IP addresses to hosts?

A. DHCP Relay
B. TFTP
C. DNS
D. DHCP

 

Answer: D

Question 98

Which two statements about the default configuration of a Cisco IOS router are true? (Choose two)

A. In privileged EXEC mode, the console times out after 10 minutes of inactivity.
B. The loopback 0 interface is enabled.
C. The first connected interface becomes the gateway of last resort.
D. The enable password password and enable secret password are both set to cisco.
E. The hostname of the device is displayed in lower-case letters only, even if you specify capital letters.
F. The default hostname is Router.

 

Answer: A F

Question 99

Which statement about a router-on-a-stick configuration is true?

A. It is most appropriate for use on large networks with both Layer2 and Layer3 switches.
B. It can perform 802.1q encapsulation.
C. It can act as a multilayer switch.
D. It can classify packets for QoS.

 

Answer: B

Question 100

Which information is missing from a default syslog message?

A. HOSTNAME
B. SEVERITY
C. MESSAGE
D. TIMESTAMP

 

Answer: A

Question 101

Which statement about the default Cisco Discovery Protocol configuration is true?

A. CDPv1 is disabled on FastEthernet interfaces.
B. CDPv2 advertisements are unicast.
C. CDPv1 is enabled on Frame Relay subinterfaces.
D. CDPv2 advertisements are broadcast.

 

Answer: D

Question 102

A router is deployed with the default factory settings. If a user on the router mistypes a command, which option is the result?

A. The router immediately returns an error message.
B. The router recognizes the mistake and discards the request.
C. The router autocorrects the mistyped command.
D. The router attempts to resolve the command to an IP address.
E. The router disables DNS lookup.

 

Answer: D

Explanation

When you mistype a command in privileged mode (Router#), the router thinks you’re trying to Telnet to a remote host so you have to wait with a message like this:

Translating “contin”…domain server (255.255.255.255)

This is because by default the command “ip domain-lookup” is enabled. It enables the Domain Name Server (DNS) lookup feature which performs a DNS lookup on what you entered. If you haven’t configured DNS on the router, the command prompt will hang until the DNS lookup fails. We can cancel the translation with Ctrl + Shift + 6. If we don’t have a real DNS server then we should turn this feature off with the “no ip domain-lookup” command.

Question 103

Which value does RIPv2 use to calculate its route metric?

A. delay
B. bandwidth
C. hop count
D. reliability

 

Answer: C

Explanation

RIP only uses hop count (the number of routers) to determine the best way to a remote network.

Question 104

Which value is calculated by the sender and receiver of a frame to determine whether the frame has been damaged in transit?

A. the runt value
B. the CRC value
C. the giant value
D. the collision value

 

Answer: B

Explanation

At the end of each frame there is a Frame Check Sequence (FCS) field. FCS can be analyzed to determine if errors have occurred. FCS uses cyclic redundancy check (CRC) algorithm to detect errors in the transmitted frames. Before sending data, the sending host generates a CRC based on the header and data of that frame. When this frame arrives, the receiving host uses the same algorithm to generate its own CRC and compare them. If they do not match then a CRC error will occur.

Ethernet802.3_Frame_Format.jpg

Note:
+ Runts are frames which do not meet the minimum frame size of 64 bytes. Runts are usually created by collisions.
+ Giants: frames that are larger than 1,518 bytes

Question 105

What is the default number of secure MAC addresses for an interface configured with port security?

A. 1
B. 255
C. 1042
D. 3072

 

Answer: A

Question 106

Which device mode must you use to recover a password on a Cisco IOS device?

A. privileged EXEC
B. global configuration
C. user EXEC
D. ROMmon

 

Answer: D

Explanation

To reset the password we can type “confreg 0x2142” under rommon mode to set the configuration register to 2142 in hexadecimal (the prefix 0x means hexadecimal (base 16)). With this setting when that router reboots, it bypasses the startup-config.

Question 107

Which difference between TCP and UDP is true?

A. Only TCP orders the packets that are transmitted.
B. Only UDP retransmits packets to ensure delivery.
C. Only TCP has eliminated error checking.
D. Only UDP requires recipients to acknowledge packet receipt.

 

Answer: A

Explanation

UDP header does have a checksum field which provides error detection for this protocol. But the difference (from TCP) is it does not request a retransmit when an error is found, it just simply discards that packet. In short, UDP has error detection while TCP has error recovery mechanism.

Question 108

Which command do you enter to configure a device as an authoritative time server?

A. ntp authenticate
B. ntp server 127.0.0.1
C. ntp source 127.0.0.1
D. ntp master 1

 

Answer: D

Explanation

An Authoritative NTP Server can distribute time even when it is not synchronized to an existing time server. To configure a Cisco device as an Authoritative NTP Server, use the ntp master [stratum] command.

Question 109

Which two configuration steps will prevent an unauthorized PC from accessing the corporate network? (Choose two)

A. set the port security aging time to 0
B. create the port as a protected port and statically assign the MAC address to the address table
C. configure the switch to discover new MAC addresses after a set time of inactivity
D. enable port security on the switch
E. create the port as an access port and statically assign the MAC address to the address table

 

Answer: D E

Question 110

Which description refers to administrative distance?

A. the advertised metric to reach a network
B. the cost of a link between two neighboring routers
C. the cost to reach a network that is administratively set
D. a measure of the trustworthiness of a routing information source

 

Answer: D

Question 111

Which command do you enter on a router running RIP so that it advertises a route on the same interface on which it received the route?

A. no auto-summary
B. no ip split-horizon
C. passive-interface default
D. ip rip v2-broadcast

 

Answer: B

Explanation

The split-horizon rule states that “a router never sends information about a route back in same direction which is original information came”. This rule is used in distance vector protocol (like RIP or EIGRP) to prevent Layer 3 routing loop. But we can disable the rule with the “no ip split-horizon” command.

Question 112

Which hashing algorithm does NTP use for its authentication keys?

A. MD5
B. AES-256
C. 3DES
D. SHA

 

Answer: A

Explanation

MD5 keys are used for authentication only, not encryption. The purpose of the keys is to ensure a client it is receiving NTP time stamps from ONLY the intended server.

Question 113

Multicast IP addresses can be grouped into which two address-range assignments? (Choose two)

A. registered
B. dynamic
C. GLOP
D. source-specific multicast
E. private

 

Answer: A B

Question 114

Which two statements about 802.1Q are true? (Choose two)

A. It is an open-standard trunking protocol
B. It is a Cisco-proprietary trunking protocol
C. It inserts a 4-byte identifying tag in the Ethernet frame after the source MAC address field.
D. It encapsulates the original data frame inside a trunking header.
E. It uses a 20-bit label to identify packets within a trunk.

 

Answer: A C

Explanation

IEEE 802.1Q uses an internal tagging mechanism which inserts a 4-byte tag field in the original Ethernet frame itself between the Source Address (SA) and Type/Length fields. Because the frame is altered, the trunking device recomputes the FCS on the modified frame.

802.1Q_frame.gif

Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html

Question 115

Which component is part of an Ethernet frame?

A. checksum
B. TTL
C. sequence number
D. frame check sequence

 

Answer: D

Explanation

An Ethernet frame structure is shown below:

Ethernet802.3_Frame_Format.jpg

There are no checksum, Time-to-live (TTL) or sequence number in an Ethernet frame.

At the end of each frame there is a Frame Check Sequence (FCS) field. FCS can be analyzed to determine if errors have occurred. FCS uses cyclic redundancy check (CRC) algorithm to detect errors in the transmitted frames. Before sending data, the sending host generates a CRC based on the header and data of that frame. When this frame arrives, the receiving host uses the same algorithm to generate its own CRC and compare them. If they do not match then a CRC error will occur.

Note: In fact in the Ethernet frame structure shown above, the CRC field should be written as FCS field.

Question 116

Which Cisco SDN controller supports existing enterprise network devices?

A. APIC-EM
B. OpenFlow
C. Open SDN
D. ACI

 

Answer: A

Question 117

Which command can you enter to configure an IPv6 floating static route?

A. router(config)#ipv6 route FE80:0202::/32 serial 0/1 1
B. router (config)#ipv6 route ::/0 serial 0/1
C. router(config)#ipv6 route static resolve default
D. router(config)#ipv6 route FE80.0202::/32serial 0/1 201

 

Answer: D

Explanation

IPv6 Floating static route is static route with a higher administrative distance than the dynamic routing protocol it is backing up.

Question 118

Which feature can validate address requests and filter out invalid messages?

A. IP Source Guard
B. port security
C. DHCP snooping
D. dynamic ARP inspection

 

Answer: C

Explanation

DHCP snooping can prevent DHCP spoofing attacks. DHCP snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted.

Only ports that connect to an authorized DHCP server are trusted, and allowed to send all types of DHCP messages. All other ports on the switch are untrusted and can send only DHCP requests.

Question 119

Which subnet address is for the IP address 172.19.20.23/28?

A. 172.19.20.20
B. 172.19.20.0
C. 172.19.20.32
D. 172.19.20.15
E. 172.19.20.16

 

Answer: E

Explanation

Increment: 16 (/28 = 1111 0000 in fourth octet)
Network address: 172.19.20.16
Broadcast address: 172.19.20.31

Question 120

Which two statements are true for multicast MAC address directions? (Choose two)

A. 01:00:5E:AE:17:28
B. one to one
C. 01 00 43 AF5426B
D. 02 46 54BDCF6A8
E. one to many

 

Answer: A E

Question 121

How many host addresses are available on the network 192.168.1.0 subnet 255.255.255.240? (Choose two)

A. 6
B. 8
C. 14
D. 16

 

Answer: C

Explanation

240 = 1111 0000 in fourth octet so the formula of host addresses is: the number of host addresses = 2k – 2 (where k is the number of bit 0). In this case k = 4 so the number of host addresses = 24 – 2 = 14.

Question 122

Which two statements about fiber cable are true? (Choose two)

A. Single-mode fiber supports SC and LC connectors only.
B. Multimode cable supports speeds between 100 Mbps and 9.92 Gbps.
C. Single-mode cable is most appropriate for installations longer than 10 km.
D. Fiber cable is relatively inexpensive and supports a higher data rate than coaxial cable.
E. Mulitimode cable supports speeds between 100 Mbps and 100 Gpbs.

 

Answer: D E

Question 123

After you configure the ip dns spoofing command globally on a device, under which two conditions is DNS spoofing enabled on the device? (Choose two)

A. The ip dns spoofing command is disabled on the local interface
B. The ip host command is disabled
C. All configured IP name server addresses are removed
D. The DNS server queue limit is disabled
E. The no ip domain lookup command is configured

 

Answer: B C

Explanation

DNS spoofing is designed to allow a router to act as a proxy DNS server and “spoof” replies to any DNS queries using either the configured IP address in the ip dns spoofing ip-address command or the IP address of the incoming interface for the query. This feature is useful for devices where the interface toward the Internet service provider (ISP) is not up. Once the interface to the ISP is up, the router forwards DNS queries to the real DNS servers.This feature turns on DNS spoofing and is functional if any of the following conditions are true:
+ The no ip domain-lookup command is configured.
+ IP name server addresses are not configured.
+ There are no valid interfaces or routes for sending to the configured name server addresses

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr_dns/configuration/12-2sr/dns-12-2sr-book.pdf

Question 124

Which statement about unique local IPv6 addresses is true?

A. Summarization is not supported.
B. They require all prefixes to be unique.
C. Their global IDs are assigned sequentially.
D. They are routable to the public Internet.

 

Answer: B

Explanation

IPv6 Unique Local Address is the approximate IPv6 counterpart of the IPv4 private address. It is not routable on the global Internet but it can be routable inside of a company’s multiple sites. A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7.

Unique Local IPv6 addresses can be viewed as globally unique “private routable” IPv6 addresses, but only inside an organization -> Answer B seems to be correct.

Comments (43) Comments
  1. Fancy
    July 9th, 2019

    Why question 4 ip routing?its wrong. Could you confirm these are question pearson vue Cisco?

  2. I PASSED 1CND1
    July 23rd, 2019

    THANK YOU FOR THE UPDATED QUESTIONS!!! I PASSES WITH A 919!!!

  3. Linkk87
    July 25th, 2019

    Hey Fancy, Same questions?

  4. Exam tomorrow
    July 29th, 2019

    are those dumps still valid?

  5. doctore
    August 10th, 2019

    Any updates? Any repeated questions from above?

  6. oh yes
    August 11th, 2019

    I had the question about switchport trunk encapsulation dot1q
    would you use the switchport nonegotiate command or not at the end ?

  7. doctore
    August 13th, 2019

    @oh yes

    if you try to use command SW2(config-if)#switchport mode trunk you might get an error:

    “Command rejected: An interface whose trunk encapsulation is “Auto” can not be configured to “trunk” mode.”

    By default the switch will negotiate about the trunk encapsulation type. So you have to change enc. to dot1q (eventually ISL).

    SW1(config-if)#switchport trunk encapsulation dot1q

    BTW. How was the exam? How many questions was repeated from 9tut?

  8. oh yes
    August 14th, 2019

    doctore,
    it was very difficult it looks like alot of stuff from icnd2 trickled down to incd1
    alot of them were repeated i got a 782 i was almost there im taking again this friday the 16th
    these are the commands i would use is this right ?
    interface fa 0/1
    switchport trunk encapsulation dot1q
    switchport mode trunk
    switchport nonegotiate

    on the interface would this be correct?

  9. oh yes
    August 14th, 2019

    Also that if if you dont use nonegotiate command the the dtp frames will go through
    i just dont remember the whole question to be sure

  10. helpmeoutguys
    September 1st, 2019

    hey can somebody send me the latest dump please? jdsethkesler @ gmail.com

  11. sheba
    September 10th, 2019

    I took the test Today and passed 912/1000 had 6 drag and drop questions , 2 Sims
    most of the ICND-1 questions exactly from 9tut.net questions and based on the same concepts
    all from icnd1v3-new-questions-part-2 ….good luck everyone…many thanks to 9TUT.NET

  12. JimGol
    September 11th, 2019

    congratulation Sheba and thanks for your comment. I am taking the exam on the 12th.

  13. Need current dump please
    September 16th, 2019

    bardiagolkar

    @

    gmail
    .
    com

    Thank you, exam is in two weeks.

  14. cablekrypto
    September 17th, 2019

    Passed the ICND-1 yesterday. Thanks to 9TUT.NET Same questions from ICND1v3 New Questions Part-2. Off to ICND-2

  15. Alan
    September 17th, 2019

    @cablekrypto: Congrats! Did you see any questions from ICND1v3 New Questions Part-3 as I am learning on it?

  16. cablekrypto
    September 18th, 2019

    Alan
    Thanks, there was maybe 1 or 2 questions only, majority was from part 2.

  17. Alan
    September 18th, 2019

    @cablekrypto: Thank you very much for your information!

  18. Anonymous
    September 19th, 2019

    @cablekrypto: what about the simulations? are they the same as on 9tut?

  19. Anonymous
    September 20th, 2019

    I had 2 sims. One of them is the same as the configuration sim, the 2nd sim was about RIPv2. Similar to this simulation on the other 9tut website. https://www.9tut.com/ripv2-troubleshooting-sim#more-2853

  20. Anonymous
    September 21st, 2019

    I passed the ICND1 exam, with 910 final result. All 9tut questions are valid, especially V2. There were 5 Drag & Drop and 2 Labs. One lab is about Switch configuration. Two switches connected eath other, and 2 PC in each switch, the challenger was for creat VLANS 700 and 800, named the vlans and add to respective switches interface.

  21. Anonymous
    September 26th, 2019

    Hi, Thanks 9tut.net, I passed the ICDN1 exam, with 942, the 60% of questions especially of “ICND1v3 – New Questions Part 2” and the questions are similars questions and I found 10 new questions (Drag of Wireless and Wireless Protocols)

  22. Anonymous
    September 27th, 2019

    #43 correct answer should be D. 4094

    reserved vlans:
    0, 4095
    1006-1024
    1025-4094

  23. MRNY
    October 18th, 2019

    Q75

    Answer is A and C?
    For example, if an IP address of 192.168.1.1/24 is set for the router interface,
    the following entry should be created in the routing table.
    L 192.168.1.1/32 …
    C 192.168.1.0/24…

    This is “2 Subnets, 2 masks”,
    So [A . combination of local and connected routes totaling two subnets. ] is Collect.

    Learning from the routing protocol cannot be judged from this output result, so D is incorrect.

  24. Anonymous
    October 25th, 2019

    Just passed ICND 1 with a 900. Thank you 9tut.net !!!

  25. Ladytechie
    November 13th, 2019

    Did not pass got 747, needed to focus on sims more next time. Some questions were 9tut. In all fairness I did not use 9tut until a couple days before exam. I was told if you fail 2 sims, you won’t pass anyways.

  26. kk
    November 27th, 2019

    Hi, i think u miss out another encapsulation dot1q config for the 2nd vlan in the explanation of Question 66.

  27. yopi
    December 9th, 2019

    Hey, someone can explaine me the answer of the question number 90 ?

  28. yopi
    December 12th, 2019

    Can you send me the latest dumps for 100-105 ICND1 to: yopiicnd1 @ gmail.com
    much help

  29. Anonymous
    December 20th, 2019

    Yopi, Below is the explanation about the question 90:

    Question 90

    Which static route can be used to forward a packet that is destined to 192.168.1.23?

    A. ip route 192.168.1.16 255.255.255.252 192.168.255.1
    B. ip route 192.168.1.0 255.255.255.240 192.168.255.1
    C. ip route 192.168.0.0 255.255.255.0 192.168.255.1
    D. ip route 192.168.1.20 255.255.255.252 192.168.255.1

    Let’s say the IP address 192.168.1.23 belongs to a specific device, for example PCA. Therefore, this address IP belongs to 192.168.1.20 subnet or network. In this subnet, the first usable IP address will be 192.168.1.21, and 192.168.1.23 will be the third usable IP address. So if I would like to add statically the network 192.168.1.20 where PCA belongs to (192.168.1.23), in my routing table, the command will be:
    ip route 192.168.1.20 (target network to add in the routing table) 255.255.255.252 192.168.255.1 (can be next hop IP).

    I hope it’s help.

  30. Navkar
    December 22nd, 2019

    someone please explain about Q-96 why the answer is D?

  31. XeXe
    December 24th, 2019

    Can you send me the latest dumps for 100-105 ICND1 to : {email not allowed}

  32. XeXe
    December 24th, 2019

    Can you send me the latest dumps for 100-105 ICND1 to : zaraq.zaman at gmaildotcom

  33. Anonymous
    January 8th, 2020

    Hey everyone,

    Could anyone please send me the latest INCD 1 & 2 Dumps. That would be greatly appreciated.

    Email: kelvin.mullings(@)gmail.com

  34. 1up4kel
    January 14th, 2020

    Just pass the ICND1 with 896 today!!
    Super excited and ready to tackle ICND2 on 1/28//2020.
    Ppl, everything you need is on 9tut…facts!!
    Big thanks 9tut!!

    Grind till I Die!!!

  35. 1up4kel
    January 14th, 2020

    Pass ICND1 with 896 today!
    Thanks 9tut for the assist!!

  36. 1up4kel
    January 15th, 2020

    Admin,
    Is there a reason, why there is only CCNA test material and no CCNP?

  37. Anonymous
    January 20th, 2020

    passed my icnd1 exam today I got 930 most of the exam came from 9tut 2 simu and 5 drag and drop questions

  38. ITguy
    January 31st, 2020

    Passed ICND1 with a 953. I had about 50% questions from this site. The lab sims were the same concept, but they broke different elements so you need to know your fundamentals.

    I had two lab sims, probably 5-6 drag and drop. Probably only one subnetting question. A couple IPv6 questions I was not familiar with.

  39. Anonymous
    February 15th, 2020

    Question 21 references the OSI Model

  40. Urkel
    February 17th, 2020

    Q90. Wouldn’t the answer be “A,” because the the host address 192.168.1.23 falls in between the 192.168.1.16 subnet? 192.168.1.23 is a broadcast address of 192.168.1.20 subnet. Correct me if I’m wrong, but use your binary chart.

  41. Aibra
    February 19th, 2020

    @ Urkel

    the increment is 4 ==> the networks are
    .0
    .4
    .8
    .12
    .16
    .20
    .24

    so 192.168.1.23 belong to the network 192.168.1.20

  42. Anonymous
    February 19th, 2020

    @Albra

    192.168.1.20(network add)-192.168.1.23(broadcast)

    Never use a network or broadcast address for a host. .0-.3 has four available IP’s, but only two addresses are available for hosts(.1 and .2).

  43. Anonymous
    February 19th, 2020

    *@Albra sry sub those numbers in my last post for .20-.3 and .21 and .22 and it makes more sense. For example 24 would be the next network address and .27 would be the next broadscast