Curioustab
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
Aptitude
General Knowledge
Verbal Reasoning
Computer Science
Interview
CISCO Certification Questions
What command will display the forward / filter table?
You want to run the new 802.1w on your switches. which of the following would enable this protocol?
You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?
Which proprietary Cisco STP extensions would put a switch port into err-disabled if a BPDU is received on this port?
Which Cisco 802.1d extension stops BPDU from being transmitted out a port?
Which switching technology reduces the size of a broadcast domain?
You want to improve network performance by increasing the bandwidth available to hosts and limit the size of the broadcast domains. Which of the following options will achieve this goal?
A switch has been configured configured for three different VLANs : VLAN2, VLAN3 and VLAN4. A router has been added to provide communication between the VLANs. What minimum type of interface necessary on the router if only one connection is to be made between the router and the switch?
Which of the following commands sets a trunk port on a 2960 switch?
You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?
What is frame tagging?
What type of Cisco tagging information allows VLANs to be multiplexed over a trunk link through an external encapsulation method?
Which of the following is an example of a standard IP access list?
You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 . Which of the following lists will you use?
What router command allows you to determine whether an IP access list is enabled on a particular interface?
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?
Which command would you use to apply an access list to a router interface?
What is the most common attack on a network today?
What command would you use to create an extended access list that stops host 172.16.10.1 fro telnetting to host 172.16.30.5?
What command would you use to set an access list on a VTY line?
1
2
3
4
5
6
7
8
9
10
11
12