Documente Academic
Documente Profesional
Documente Cultură
A. host name
B. severity
C. timestamp
D. message
Answer: A
Question 2
A. STP
B. CDP
C. VTP
D. Etherchannel
Answer: C
Question 3
What is the maximum size of an Ethernet frame that uses 802.1Q tagging?
A. 1514 bytes
B. 128 bytes
C. 68 bytes
D. 1522 bytes
Answer: D
Question 4
When configuring a default gateway, should it be ip route 0.0.0.0…. or serial 0/0 0.0.0.0……
– dont know answer
Question 5
Answer: B
Explanation
In this question only the “Gateway of last resort” answer is suitable. A Gateway of Last
Resort or Default gateway is a route used by the router when no other known route exists to
transmit the IP packet. Known routes are present in the routing table. Hence, any route not
known by the routing table is forwarded to the default route.
In fact this question is a bit unclear. Maybe it implies “creating a static route to network
0.0.0.0 0.0.0.0 is another way to set the gateway of last resort on a router.”
Reference: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-
rip/16448-default.html
Question 6
Answer: C
Question 7
If you are in VLAN 10 and it gets a packet from VLAN 2 with 802.1q enabled, what does it do
with the packet?
Answer: A
Question 8
Answer:
Question 9
A. MPLS
B. Cisco express forwarding
C. Process switching
D. Fast switching
Answer: B
Question 10
Which type of network topology requires each network node to be connected to one another?
A. Ring
B. Star
C. Mesh
D. Bus
Answer: C
Question 11
A router receives identical prefixes from OSPF, EIGRP, RIP and the same route is configured
statically. Which route does the router use to forward traffic?
A. Static route
B. RIP route
C. EIGRP route
D. OSPF route
Answer: A
Question 12
Question 13
A. 2
B. 6
C. 4
D. 0
Answer: B
Question 14
Which option describes a standard role that a firewall plays in an enterprise network?
A. It can permit unauthorized packets to pass to less secure segments of the network
B. It can decide which packets can traverse from a less secure segment of the network to a
more secure
C. It can forward packets based on rules that are predetermined by IEEE standards
D. It can deny all packets from entering an administrative domain.
Answer: B
Question 15
A question with the mac table on a switch with mac 1111:1111:1111 and port 0/1 and the
question was asking : You received a packet with destination mac 1111:1111:1111 on port
0/1 , how does the switch will handle the frame.
Question 16
A.10 base2
B.10 base5
C.100 base2
D.100base5
…
Question 17
Answer: 11111111
Explanation
IPv6 multicast addresses are distinguished from unicast addresses by the value of the high-
order octet of the addresses: a value of 0xFF (binary 11111111) identifies an address as a
multicast address; any other value identifies an address as a unicast address
Question 18
Answer: EIGRP
Explanation
Question 19
Assume all the routing protocol have the same length prefix, what would the router prefer?
A. OSPF
B. EIGRP
C. CONNECTED
D. BGP
Answer: C
Question 20
A. On a stub network
B. On a large network that must share routes quickly between routers
C. On a network that experiences frequent link failures
D. On a network with frequent routing changes
Answers: A
Question 21
Answer: B
Question 22
Which statement is correct when comparing dynamic route and static route?
Question 23
What would the router use as metrics when having different routing protocol in the routing
table
A. Prefix length
Question 24
Question 25
A. They have an implicit permit statement at the end to allow all traffic
B. They can use either a wildcard mask or a subnet mask to identify host
C. They can be identified by a number from 1 to 99
D. They must be placed close to the source of traffic
Answer: C
Question 26
Which of the following item is used to establish telnet session by having the host name?
A. DNS lookup
B. Ping
C. Syslog
D. ARP
Answer: A
Question 27
Which of the following command can be use to access all the files in a system?
A. syslog
B. IFS
C. ping
D. NTP
Answer: B
Question 28
Answer: D
Question 29
A. wildcard
B. empty routing table
C. Null table
D. Gateway of last resort
Question 30
A host is attempting to communicate with a server from an application layer. The connection
has failed, what would be the first layer to start from the troubleshooting standpoint?
A. network
B. Application
C. physical
D. session
Answer: C
Question 31
The left describes the types of cables, while the right describes the purposes of the cables.
Drag the items on the left to the proper locations. (Not all items can be used.)
Answer:
Explanation
To remember which type of cable you should use, follow these tips:
For example: we use straight-through cable to connect switch to router, switch to host, hub
to host, hub to server… and we use crossover cable to connect switch to switch, switch to
hub, router to router, host to host… )
Question 32
Which destination IP address can a host use to send one message to multiple devices across
…?
A. 239.255.0.1
B. 172.20.1.0
C. 192.168.0.119
D. 127.0.0.1
Question 33
Which value is of primary importance when a router populates its routing table for unique
routes?
A. Administrative distance
B. Prefix length
C. Network address
D. Metric
Answer: A
Explanation
Making a forwarding decision actually consists of three sets of processes: the routing
protocols, the routing table, and the actual process which makes a forwarding decision and
switches packets. The longest prefix match always wins among the routes actually installed
in the routing table, while the routing protocol with the lowest administrative distance always
wins when installing routes into the routing table.
Reference: http://www.cisco.com/c/en/us/support/docs/ip/enhanced-interior-gateway-
routing-protocol-eigrp/8651-21.html
Question 34
A. Global unicast
B. Multicast
C. Link local
D. Unique-local
Answer: A
Question 35
A. When the switch receives an Ethernet frame with a new destination MAC address, it
installs the destination MAC address and the ingress switch port in the MAC address table
B. When the switch receives an Ethernet frame with a new source MAC address, it installs
the source MAC address and the ingress switch port in the MAC address table
C. When the switch receives an Ethernet frame with a new destination MAC address, it
installs the destination MAC address and the egress switch port in the MAC address table
D. When the switch receives an Ethernet frame in which the source and destination MAC
address are new, it installs the destination MAC address and the ingress switch port in the
MAC address table
Answer: B
Explanation
A switch only learns (populates) its MAC address table with source MAC addresses only.
Question 36
Answer: A
Explanation
The “exec-timeout” command is used to configure the inactive session timeout on the
console port or the virtual terminal. The syntax of this command is:
Therefore we need to use the “exec-timeout 30” command to set the user inactivity timer to
30 minutes. To set the user inactivity timer to 30 seconds we use the “exec-timeout 0 30”.
Question 37
A. When a violation occurs on a switch port in restrict mode, the switch port continues to
accept traffic from unknown MAC address until the administrator manually disables it.
B. When a violation occurs on a switch port in protect mode, it sends a syslog notification
message
C. A port In the err-disabled state must be re-enabled manually, if recovery is disabled
D. When a switch port is in protect mode, it allows traffic from unknown MAC address until it
has learned the maximum allowable number of MAC addresses
Answer: C
Question 38
Answer: B
Question 39
Which metric or metrics does RIP use to determine the routing table metric for a route?
Question 40
Which network configuration allows a switch to send traffic from multiple VLANS over a
single link to a router that routes between the VLANs?
A. Port channel
B. Router-on-a-stick
C. Virtual trunking
D. Spanning-tree
Answer: B
Question 41
Which statement about native VLAN traffic over 802.1Q trunk is true?
A. It is discarded by STP
B. It is placed is a high-priority queue
C. It is tagged with a value of 1
D. It is untagged
Answer: D
Question 42
Which feature allows a device to use a switch port that is configured for half-duplex to access
the network?
A. Split horizon
B. CSMA/CD
C. IGMP
D. Port security
Answer: B
Explanation
CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. In an
Ethernet LAN, before transmitting, a computer first listens to the network media. If the
media is idle, the computer sends its data. If the media is not idle (another station is
talking), the computer must wait for some time.
When a station transmits, the signal is referred to as a carrier. Carrier Sense means that
before a station can send data onto an Ethernet wire, it have to listen to see if another
“carrier” (of another station) is present. If another station is talking, this station will wait
until there is no carrier present.
Multiple Access means that stations can access the network at any time. It is opposed to
Token-Ring network where a station must have the “token” so that it can send data.
In short, CSMA/CD is the technology used for half-duplex switch port to transmit. CSMA/CD
is not necessary for full-duplex switch port.
Question 43
Refer to the exhibit.
<exhibit missing>
If switch-A receives a frame with destination MAC address 0000.0000.0001 on its Fa0/1
interface, how does it process the frame?
Answer: maybe B
Explanation
As the exhibit is missing so we can only guess. But B is the most suitable answer in all cases.
If the MAC address 0000.0000.0001 is new to the switch (this MAC have not existed in the
MAC address table) then surely the answer is B.
Question 44
When a router makes a routing decision for a packet that is received from one network and
destined to another, which portion of the packet does it replace?
A. Layer 4 protocol
B. Layer 3 IP address
C. Layer 2 frame header and trailer
D. Layer 5 session
Answer: C
Explanation
During the transmission of a packet from source to destination, only Layer 2 information is
replaced in the path. Layer 3 information remains the same (except when NAT is used).
Question 45
Answer: C
Question 46
A. VRF
B. Subinterfaces
C. PIM sparse mode
D. Passive-interface
Answer: B
Question 47
You have configured the host computers on a campus LAN to receive their DHCP addresses
from the local router to be able to browse their corporate site. Which statement about the
network environment is true?
Answer: C
Explanation
DHCP supports configuring a domain name to assign to the DHCP clients. For example:
Question 48
Answer: C
Question 49
A. IGMP
B. STP
C. VTP
D. 802.1Q
Answer: C
Question 50
Client A cannot reach client B by its hostname. Which reason for the problem is most likely
true?
Question 51
Which first step must a client perform to connect to an internal host when the hostname is
known, but the IP address is unknown?
A. The client sends the host name in a DNS reply to a DNS server, and the DNS server
responds with the host IP address
B. The client exchanges IP address information with a DNS server on the same LAN
C. The client looks up the hostname in the ARP table to determine the IP address
D. The client sends the host name in a DNS request to a DNS server, and the DNS server
responds with the host IP address.
Answer: D
Explanation
When a client knew about the hostname but not the IP address, it needs to resolve the
hostname to the IP address by sending a DNS request to its DNS server.
Notice that the ARP table is responsible for resolving IP address to MAC address only. It has
nothing to do with the hostname.
Question 52
Question 53
Question 54
If a switch received a frame while forwarding others, how frame would be handled?
Answer: C
Question 55
Answer: D
Question 56
A. Administrative distance
B. Metric
C. Next hop
D. Destination network
Answer: C
Question 57
Which of the following options could be used on router to prevent reassign IP address
statically?
A. Pool
B. Lease
C. Client ID
D. Exclude address
Answer: D
Question 58
A router with a default setting deployed, how will act if it received mistype command?
Answer: C
Question 59
A. .
B. *
C. ?
D. U
Answer: C
Explanation
The table below lists the possible output characters from the ping facility:
Character Description
Reference: https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-software-
releases-121-mainline/12778-ping-traceroute.html
Question 60
A. 10 Base T
B. 100 Base T
C. 10 Base 5
D. 10 Base 2
Answer: A B
Question 61
Answer: D
Question 62
Answer: A
Question 63
A. 32/prefix
B. 255.255.255.0
C. The administrative distance is 0
D. Dynamically learned
E. ?
Answer: A C
Question 64
Answer: A B
Question 65
Answer: C
Question 66
A. GMT
B. UMT
Answer: B
1. Anonymous
August 19th, 2019
Hi Guys
taking ICND1 exam next month could some one please send new dumps to me: {email not
allowed}
2. Resoldier
August 21st, 2019
Hey Peeps!!!
Passed the ICND1 exam last friday at my 1st attempt. I had 54 questions and pass mark was
832, managed to get 878. Good luck guys and thanks 9tut a lot helped me understand
certain concept.
3. unkowneee
August 22nd, 2019
Hi Resoldier ,
Hi unknowneee,
Yes most of the questions were similar but like you said wordings and the orders of the
answers were different. I was well prepared for the Subnet questions but I had only one
question. Loads of switching questions on mine.
5. Anonymous
August 27th, 2019
I took the test yesterday and had way more drag and drop questions than i thought there
were. a lot of sequence of events drag and drop stuff.
6. me
September 1st, 2019
Hello
Are most of the ICND-1 questions exactly similar to 9tut.net questions or based on the same
concepts? Also, for the labs/sims, are the questions from here or similar to what they have
here on 9tut?
8. Anonymous
September 9th, 2019
are numbers 23 and 33 answers right? I feeel like they should be switched. anybody know?
9. sheba
September 10th, 2019
I took the test Today and passed 912/1000 had 6 drag and drop questions , 2 Sims
most of the ICND-1 questions exactly from 9tut.net questions and based on the same
concepts
all from icnd1v3-new-questions-part-2 ….good luck everyone…many thanks to 9TUT.NET
10. Anonymous
September 20th, 2019
What would the router use as metrics when having different routing protocol in the routing
table
A. Prefix length