Here is Wednesday's THIRD set of CCNA, CCNP, and Network+ exam practice questions!
Network+:
Which of the following devices can be used to create broadcast domains?
A. hubs
B. repeaters
C. switches
D. routers
CCNA:
In how many different EIGRP tables can the Successor be found?
A. None of them.
B. One of them.
C. Two of them.
D. Three of them.
E. All four of them.
CCNP / BSCI:
Which of the following modes of injecting IGP routes into BGP should be avoided?
A. Redistributing a static route into BGP.
B. Redistributing a directly connected route into BGP.
C. Using the network command in BGP.
D. Redistributing dynamically learned IGP routes into BGP.
CCNP / BCMSN:
What is one similarity between the trunking protocols ISL and dot1q?
A. They both work well in multivendor environments.
B. They are both supported by 2950 switches.
C. They both make most frames larger.
D. They both recognize the concept of the native VLAN.
CCNP / BCRAN:
What term is described by the following? "Only the devices that should see the data in an unencrypted form will see the data in that form."
A. Data Integrity
B. Data Encryption
C. Data Origin Authentication
D. Data Confidentiality
CCNP / CIT:
Short answer: What are the numeric ranges for standard access lists?
Network+:
Which of the following devices can be used to create broadcast domains?
A. hubs
B. repeaters
C. switches
D. routers
CCNA:
In how many different EIGRP tables can the Successor be found?
A. None of them.
B. One of them.
C. Two of them.
D. Three of them.
E. All four of them.
CCNP / BSCI:
Which of the following modes of injecting IGP routes into BGP should be avoided?
A. Redistributing a static route into BGP.
B. Redistributing a directly connected route into BGP.
C. Using the network command in BGP.
D. Redistributing dynamically learned IGP routes into BGP.
CCNP / BCMSN:
What is one similarity between the trunking protocols ISL and dot1q?
A. They both work well in multivendor environments.
B. They are both supported by 2950 switches.
C. They both make most frames larger.
D. They both recognize the concept of the native VLAN.
CCNP / BCRAN:
What term is described by the following? "Only the devices that should see the data in an unencrypted form will see the data in that form."
A. Data Integrity
B. Data Encryption
C. Data Origin Authentication
D. Data Confidentiality
CCNP / CIT:
Short answer: What are the numeric ranges for standard access lists?
Comments