1.
Which type of network uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as an access method?
2.
You are advising a client on the options available to connect a small office to an ISP.
Which of the following is an advantage of using an ADSL line?
3.
Consider the following diagram:
Which of the following routing protocols could NOT be used with this design?
4.
You and your team are evaluating the use of OSPFv3 in your IPv6 network.
Which of the following statements is true of OSPFv3?
5.
You have established a console session with R1 and you are attempting to download an IOS image from the TFTP server in the diagram below.

However, you are unable to make the connection to 150.140.6.5. What is the problem?
6.
R1 and R2 are connected as shown in the diagram and are configured as shown in output in the partial output of the show run command.

The command ping R2 fails when executed from R1. What command(s) would allow R1 to ping R2 by name?
7.
You run the following command:
switch# show ip interface brief


What information is displayed?
8.
Which Cisco Internetwork Operating System (IOS) command would be used to set the privileged mode password to "cisco"?
9.
What command produced the following as a part of its output?
1 14.0.0.2 4 msec 4 msec 4 msec
2 63.0.0.3 20 msec 16 msec 16 msec
3 33.0.0.4 16 msec * 16 msec
10.
From which of the following attacks can Message Authentication Code (MAC) shield your network?