Cisco Ccna Exam Questions
cisco certification 200-125 ccna exam preparation with practice questions and Answers
What are Two Characteristics of RIPv2 Routing Protocol
Manual Route Summarization
Use Bandwidth as Cost
Unequal Cost Load Balancing
Manage a Topology Table
Classless Routing Protocol
Newer Post
Older Post
Home
Popular Posts
What is the network address of the host 172.25.67.99 /23 in binary?
10101100. 00011001.01000011.00000000 10101100. 00011001.01000011.11111111 10101100. 00011001.01000010.00000000 10101100. 00011001.01000010.0...
Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (Choose two.)
Refer to the exhibit. What two commands will change the next-hop address for the 10.0.0.0/8 network from 172.16.40.2 to 192.168.1.2? (C...
Which three statements are true regarding the encapsulation and de-encapsulation of packets when traveling through a router? (Choose three.)
The router modifies the TTL field, decrementing it by one. The router changes the source IP to the IP of the exit interface. The router ma...
Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the topology that is shown?
Refer to the exhibit. All devices shown in the exhibit have factory default settings. How many broadcast domains are represented in the...
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface console interface Ethernet interface secret EXEC mode privileged EXEC mode router configuration mode
Refer to the exhibit. Which term correctly identifies the device type that is included in the area B?
source end transfer intermediary
A growing medium-sized manufacturing company recently began to have routing instability issues. The company uses static routes and has a mixture of over 30 Cisco and non-Cisco routers. The network administrator has decided to convert the network to dynamic routing. What characteristics of protocols should be considered in this selection process?
Distance vector routing protocols, such as RIP, converge more quickly than do link-state routing protocols. EIGRP can be used on all of th...
Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 mask. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the workgroup server’s properties to allow connectivity to the network?
Refer to the exhibit. The network administrator has assigned the internetwork of LBMISS an address range of 192.168.10.0. This address ...
Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate in the process? (Choose two.)
Refer to the exhibit. Host_A is attempting to contact Server_B. Which statements correctly describe the addressing Host_A will generate ...
Refer to the exhibit. What characteristic of hierarchical network designs is exhibited by having SW3 connected to both SW1 and Sw2?
Refer to the exhibit. What characteristic of hierarchical network designs is exhibited by having SW3 connected to both SW1 and Sw2?