CCNA最新真题

来源:百度文库 编辑:神马文学网 时间:2024/04/29 14:21:19
1)TCP/IP Addressing and Protocol
1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him?
A. 255.0.0.0
B. 255.255.0.0
C. 255.245.255.0
D. 255.255.255.0
E. 255.255.255.255
2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity?
A. TCP
B. UDP
C. IP
D. ICMP
3: You are designing a network, which needs to support 55 users. You don‘t plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs?
A. 255.255.0.0
B. 255.255.255.0
C. 255.255.255.192
D. 255.255.255.160
4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch?
A. 172.16.12.33/28
B. 172.16.12.32/27
C. 172.16.12.33/27
D. 172.16.12.34/27
E. 172.16.12.35/28
F. 172.16.12.38/28
G. 172.16.12.63/27
5: The address 172.16.208.16/20 is a host address in which of the following subnets?
A. 172.16.176.0–255.255.240.0
B. 172.16.192.0–255.255.240.0
C. 172.16.208.0–255.255.240.0
D. 172.16.224.0–255.255.240.0
6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use?
A. 255.255.255.128
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240
E. 255.255.255.248
7: You have subnetted the 210.106.14.0 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her?
A. One network with 254 hosts
B. Two networks with 128 hosts
C. Four networks with 64 hosts
D. Six networks with 30 hosts
8: Identify three valid host addresses in any subnet of the 201.168.27.0 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.)
A. 201.168.27.33
B. 201.168.27.112
C. 201.168.27.119
D. 201.168.27.126
E. 201.168.27.175
F. 201.168.27.208
9: What is the subnetwork address for a host with the IP address 201.100.5.68/28?
A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1
10: Which of the following protocols uses a three-way handshake mechanism to establish sessions?
A. TCP
B. IP
C. UDP
D. IPX
E. Frame relay
11: Which of the following protocols is connection-oriented?
A. TCP
B. IP
C. IPX
D. Frame relay
12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use?
A. TCP
B. IP
C. UDP
D. SPX
E. AppleTalk
13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as ______________.
A. MTU adjustment
B. Windowing
C. Flexible Send Path
D. FCS
14: If the destination did not receive a segment, how will the TCP host know to resend the information?
A. The ACK received will not include the segment number that was not received.
B. The ACK received will include the segment number that was not received.
C. The sending host will send a PACK to verify segment receipt.
D. The destination host will send a YACK message back to the sending host.
15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient?
A. Class A
B. Class B
C. Class C
D. Class D
E. Class E
16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.)
A. 10.23.45.67
B. 126.21.34.56
C. 172.16.32.1
D. 172.31.234.55
E. 192.169.4.5
17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table?
Department
Number of Users
Corporate
7
Customer Support
15
Financial
13
HR
7
Engineering
16
A. 255.255.255.0
B. 255.255.255.192
C. 255.255.255.224
D. 255.255.255.240
E. 255.255.255.248
18: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself?
A. UDP
B. TCP
C. SNMP
D. ICMP
19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.)
A. MAC address resolution
B. Sequence numbers
C. Acknowledgments
D. Ping
E. Routing updates
20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network?
A. Increased throughput
B. Decreased throughput
C. Increased latency
D. Decreased reliability
21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.224
E. 255.255.255.240
F. 255.255.255.248
22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts?
A. ARP
B. RARP
C. SLARP
D. DHCP
23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn‘t working. Which of the following is not an answer that you would give him?
A. The host‘s default gateway is down.
B. The destination host is not powered on.
C. The IP address of the router interface is incorrect.
D. The IP address of the switch to which the destination host connects is incorrect.
E. The host is in a different subnet.
24: Which of the following classes of IP addresses is utilized for multicasting?
A. Class A
B. Class B
C. Class C
D. Class D
25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her:
A. It represents the number of hosts possible on that subnetwork.
B. It represents the number of subnetworks that are being used.
C. It represents the class of IP address being used.
D. It represents the number of bits in the subnet mask that are 1.
26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.224
E. 255.255.255.240
27: Which of the following would a Class A network be assigned to?
A. Government agency
B. Small-to-medium sized corporation
C. SOHO
D. An individual
28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.)
A. 192.168.5.95
B. 192.168.5.100
C. 192.168.5.128
D. 192.168.5.110
29: Which of the following IP addresses is not a public IP address that can be routed over the Internet?
A. 2.3.4.5
B. 11.12.13.14
C. 165.23.224.2
D. 172.31.45.34
E. 203.33.45.22
30: You are given a Class B network. What is the default subnet mask assigned to the Class B network?
A. 255.255.255.255
B. 255.255.0.0
C. 255.224.0.0
D. 0.0.0.0
31: You are troubleshooting your router‘s interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you‘ve assigned. Which of the following explains the router‘s refusal to take the IP address?
A. Class C addresses cannot be assigned to Ethernet interfaces.
B. The /27 is an invalid mask.
C. It is a broadcast address.
D. It is a public IP address.
E. It is a private IP address.
32: You are a network technician at Acme, Inc. You are required to divide the 172.12.0.0 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use?
A. 255.255.255.254
B. 255.255.254.0
C. 255.255.240.254
D. 255.255.0.0
33: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of 255.255.255.248?
A. 192.168.2.24/192.168.2.31
B. 192.168.2.32/192.168.2.39
C. 192.168.2.40/192.168.2.47
D. 192.168.2.48/192.168.2.55
E. 192.168.2.56/192.168.2.63
34: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent?
A. 218
B. 219
C. 220
D. 221
E. 222
35: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent?
A. 75
B. 83
C. 90
D. 97
36: One of your co-workers at Acme, Inc., needs to convert the binary number 11010110 into a decimal. What is the decimal equivalent?
A. 198
B. 214
C. 252
D. 255
37: One of your co-workers at Acme, Inc., needs to convert the binary number 10110110 into a decimal. What is the decimal equivalent?
A. 182
B. 192
C. 202
D. 212
38: You are configuring a subnet for the Acme, Inc., branch office in Beijing. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of 255.255.255.224. Which of these IP addresses would be valid? (Choose three.)
A. 15.234.118.63
B. 92.11.178.93
C. 134.178.18.56
D. 192.168.16.87
E. 201.45.116.159
F. 217.63.12.192
39: You are a network technician at Acme, Inc. You have subnetted the 208.98.112.0 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router is using ip subnet-zero?
A. 62 networks and 2 hosts
B. 6 networks and 30 hosts
C. 8 networks and 32 hosts
D. 16 networks and 16 hosts
E. 16 networks and 14 hosts
40: What is a disadvantage of using a connection-oriented protocol such as TCP?
A. Packet acknowledgment might add overhead.
B. Packets are not tagged with sequence numbers.
C. Loss or duplication of data packets is more likely to occur.
D. The application layer must assume responsibility for the correct sequencing of the data packets.
41: You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with a /30 mask for connections between your routers. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router cannot use ip subnet-zero?
A. 62 networks and 2 hosts
B. 6 networks and 30 hosts
C. 8 networks and 32 hosts
D. 16 networks and 16 hosts
E. 14 networks and 14 hosts
42: Which of the following IP addresses are considered "network" addresses with a /26 prefix? (Choose two.)
A. 165.203.2.0
B. 165.203.5.192
C. 165.203.6.63
D. 165.203.6.191
E. 165.203.8.255
43: Identify three valid hosts in any subnet of 192.168.32.0, assuming the subnet mask used is 255.255.255.240. (Choose three.)
A. 192.168.32.33
B. 192.168.32.112
C. 192.168.32.119
D. 192.168.32.126
E. 192.168.32.175
F. 192.168.32.208
44: A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets?
A. 198.57.78.33
B. 198.57.78.64
C. 198.57.78.97
D. 198.57.78.97
E. 198.57.78.159
F. 198.57.78.254
45: What is the subnetwork address for a host with IP address 165.100.5.68/28?
A. 165.100.5.0
B. 165.100.5.32
C. 165.100.5.64
D. 165.100.5.65
E. 165.100.5.31
F. 165.100.5.1
46: Your boss wants to know what TCP stands for. What do you tell him?
A. Transmission Check Protocol
B. Transport Check Protocol
C. Transmission Control Protocol
D. Transport Control Protocol
47: Your boss wants to know what UDP stands for. What do you tell him?
A. Unreliable Data Protocol
B. Unreliable Data Program
C. User-Defined Protocol
D. User Datagram Protocol
48: Which of the following statements accurately describes UDP?
A. UDP copies files between a computer and a system running rshd, the remote shell service (daemon).
B. UDP is a member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents.
C. UDP is a member of the TCP/IP suite of protocols and is used to copy files between two computers on the Internet. Both computers must support their respective roles: one must be a client, and the other a server.
D. UDP is a TCP complement that offers a connectionless datagram service guaranteeing neither delivery nor correct sequencing of delivered packets (much like IP).
49: Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.)
A. 10.20.12.64
B. 172.16.32.129
C. 172.64.32.34
D. 192.168.23.252
E. 196.104.12.95
F. 214.192.48.254
50: You are connecting your Serial 0/1 interface to the Internet. Which of the following need to be done for the connection to work? (Choose two.)
A. Assign a public IP address.
B. Use the shutdown command.
C. Use the no shutdown command.
D. Make sure the interface is running in full-duplex.
(2)Basic IOS Configuration
1: In which of the following modes in Cisco‘s IOS can you issue show commands? (Choose two.)
A. User
B. Privileged
C. Line Configuration
D. Global Configuration
2: Yo u are the network administrator for a large corporation. You want to be able to store all your configurations in a centralized location. Which of these servers will allow you to do so? (Choose two.)
A. FTP
B. TFTP
C. SQL
D. Oracle
3: You need to troubleshoot your network IP connectivity. Which of the following commands would you use to find the IP address on your Ethernet 0 interface?
A. ping
B. IPConfig
C. traceroute
D. Show interface Ethernet 0
4: Which command would you use at the CLI in User mode to enter Privileged EXEC mode?
A. Privilege
B. Admin
C. Enable
D. Disable
5: You have just received 14 Catalyst switches for your network. You would like to install these switches into your production network to provide separate collision domains for each of the connected devices. What configuration is required to provide this functionality?
A. No configuration is required.
B. You must set up an IP address on the switch.
C. You must configure unique VLANs on the switches.
D. You must install the Cisco IOS.
6: Which of the following prompts indicates your router is in Privileged EXEC mode?
A. Router>
B. Router#
C. Router&
D. Router$
7: You have made a console connection to your Cisco Catalyst switch and you see the > symbol in HyperTerminal. What does it mean?
A. You are in Privileged EXEC mode.
B. You are in User EXEC mode.
C. The switch has not been configured.
D. The switch is in need of repairs.
8: You would like to assign a meaningful name to your Catalyst switch. What command should you use?
A. enable
B. host name
C. hostname
D. name
9: You need to assign an IP address to your Catalyst 2950 switch. You are at the HQ_SW1> prompt. What is the correct series of commands? (cr = carriage return)
A. enable ip address 10.1.1.1
B. enable ip address 10.1.1.1 255.255.255.0
C. enable configure terminal ip address 10.1.1.1 255.255.255.0
D. enable configure terminal interface vlan 1 ip address 10.1.1.1 255.255.255.0
10: Which of the following commands displays the syntax for the clock command?
A. cl?
B. clock?
C. clock ?
D. cl ?
11: Which of the following commands allows you to configure a welcoming message whenever you log in to a router?
A. Router(config)# banner message
B. Router(config)# banner motd &
C. Router# banner motd #
D. Router# banner message !
12: You need to connect to your 2621XM router to configure an interface. Which of the following methods allows you to connect to and issue commands on the router? (Choose three.)
A. Telnet
B. FTP
C. Console connection
D. AUX connection
13: You want to prevent unauthorized users from plugging their laptops into the router. What type of password helps prevent this issue?
A. vty
B. Interface
C. Console
D. Enable
14: You have connected to the console port and are running HyperTerminal. You see only scrambled characters and symbols. What is the most likely solution to this problem?
A. Change the connectors.
B. Use a different Terminal program.
C. Reset the router.
D. Adjust the baud rate of your COM port.
[View full size image]
15: Which of the following commands would you type to receive this output shown in the figure above?
A. Show running-config
B. Show startup-config
C. Show ip route
D. Show version
16: You are configuring a router named East for authentication with a router named West using CHAP. What username should you configure on East to allow the routers to communicate?
A. East
B. West
C. South
D. North
17: What is the default point-to-point encapsulation protocol used on a Cisco router?
A. PPP
B. SLIP
C. HDLC
D. ATM
18: What type of handshake occurs with CHAP authentication?
A. One-way
B. Two-way
C. Three-way
D. Mutual
19: You have connected to your Cisco router through a Telnet connection. To test one of your connections, you use a debug ip packet command. Even though you are sure traffic is passing through your router, nothing is reported in your terminal window. What is the most likely cause of this problem?
A. There is no debug ip packet command.
B. You need to type in the terminal monitor command to see debug output from a Telnet session.
C. This command displays information only if the interface experiences trouble. No output indicates that the interface is fine.
D. Cisco routers do not allow you to enable debug commands remotely due to security restrictions.
[View full size image]
20: Which of the following commands would you type to see this output on your Cisco router shown in the previous figure?
A. Show version
B. Show running-config
C. Show startup-config
D. Show router setup
21: Which of the following commands would you type to see this output shown in the figure above?
A. Show interface Ethernet 0/0
B. Show ip interface detail
C. Show interface Serial 0/1
D. Show ip interface brief
22: Your routers at ACME, Inc., are having some connectivity issues. You issue show commands for each connecting router‘s interface. Why are they unable to communicate (see figures above)?
A. Incorrect IP address
B. Wrong routing protocol
C. Bad cable
D. Encapsulation mismatch
23: You need to back up the configurations you just made, but no TFTP servers are available. Which of the following commands are options to back up your currently running configuration? (Choose two.)
A. Router1#copy running-config startup-config
B. Router1#copy running-config flash
C. Router1#copy startup-config running-config
D. Router1#copy running-config http
24: You are consulting a small business that is establishing its first WAN link. The client wants to know what encapsulation you will be using on the link. Which of the following are valid encapsulations for WAN links? (Choose three.)
A. Frame relay
B. Ethernet
C. Token ring
D. PPP
E. HDLC
25: Your boss is concerned about security on your network. She wants to make sure that no one can identify passwords if he or she happens to view a configuration on your router. What command encrypts all passwords on your router?
A. Router1#service password-encryption
B. Router1(config)#service password-encryption
C. Router1#enable secret password
D. Router1(config)#enable secret password
26: You need to set up a password that will prevent unauthorized users from telnetting into your router. What series of commands would you use?
A. Acme1(config)# line console 0
Acme1(config-line)# password acme
Acme1(config-line)# login
B. Acme1(config)# line vty 0
Acme1(config-line)# enable password acme
C. Acme1(config)# line vty 0
Acme1(config-line)# enable secret acme
Acme1(config-line)# login
D. Acme1(config)# line vty 0
Acme1(config-line)# password acme
Acme1(config-line)# login
27: When you are setting up your serial interfaces, what does the clockrate command do for your connection?
A. Establishes the timing at which you send data
B. Establishes keepalives
C. Establishes the advertised bandwidth
D. Establishes the time on the router
28: You need to set up passwords on all your default Telnet lines. What command would you start with?
A. Router1(config)#telnet configuration
B. Router1(config)#interface Ethernet 0/1
C. Router1(config)#line vty 1 5
D. Router1(config)#line vty 0 4
29: You can execute show commands at which prompt? (Choose two.)
A. Router1#
B. Router1(config)#
C. Router1(config-router)#
D. Router1>
E. romon1>
30: You are configuring your router and type in an Enable password and an Enable Secret password. Your fellow network technician asks you why you have two passwords set when you need only one. What do you tell him?
A. The Enable password is used by low-level applications.
B. If you reverted to an older version of the IOS, it would not understand the Secret password.
C. Both passwords are treated the same.
D. It is a failsafe method of ensuring that people need to type two passwords instead of just one.
31: You need to get back to Privileged EXEC mode from Interface Configuration mode. What is the quickest method?
A. Ctrl+Shift+6; then press X
B. Ctrl+Esc
C. Ctrl+Z
D. Type exit
32: When you are establishing a PPP link, which of the following would be negotiated? (Choose three.)
A. IPCP
B. CHAP
C. UDP
D. Q.931
E. Multilink Protocol
33: Which of the following commands returns your router to a previously saved configuration?
A. Router1#setup
B. Router1#copy running-config startup-config
C. Router1#copy startup-config running-config
D. Router1#reload
34: You are in Interface Configuration mode and would like to recall the last command you typed, move your cursor to the beginning of the command line, and type no before the recalled command. You notice your up- and down-arrow keys do not function because you are using an older terminal program. What command combinations could you use to recall the previous command and move your cursor to the beginning of the line?
Press Ctrl+P to recall the previous command and Ctrl+A to move to the beginning of the command line.
Press Ctrl+L to recall the previous command and Ctrl+B to move to the beginning of the command line.
Press Ctrl+D to recall the previous command and Ctrl+A to move to the beginning of the command line.
Press Ctrl+E to recall the previous command and Ctrl+A to move to the beginning of the command line.
35: What is the baud rate setting for your terminal emulation program so that you can communicate through your console port?
A. 2400
B. 9600
C. 14400
D. 36300
36: What must be configured on a Cisco device to enable Telnet functionality?
A. A management IP address
B. SNMP
C. CDP
D. vty ports
37: You are configuring your Cisco router and need to go back to User EXEC mode. What command takes you back to User EXEC mode?
A. Router1#enable
B. Router1#exit
C. Router1#configure terminal
D. Router1#disable
38: Which of the following commands places an IP address on your Catalyst switch?
A. Switch1#ip address 10.2.2.2 255.255.255.0
B. Switch1(config)#Set IP 10.2.2.2 255.255.255.0
C. Switch1(config-vlan)#ip address 10.2.2.2
D. Switch1(config-vlan)#ip address 10.2.2.2 255.255.255.0
39: Which of the following commands would you enter to receive this output shown in the figure above?
A. Router1#show NVRAM
B. Router1#show Flash
C. Router1#show Flash-Mem
D. Router1#show Version
40: Your senior network administrator is unable to telnet to a Catalyst switch because she forgot the IP address. You have physical access and are able to console in. Which of the following commands is the best to get the IP address on the switch?
A. Switch1#show ip
B. Switch1#show vlan 1
C. Switch1#show ip route
D. Switch1#show interface vlan1
41: You have powered up your Cisco 3640 router. The first thing you see is this output. Which of the following statements about this screen is accurate (see figure above)?
A. Your IOS is corrupt and unable to load.
B. Your configuration is missing parameters.
C. You do not have a configuration saved in NVRAM.
D. You have typed setup in the Privileged mode.
42: You type in a command and are shown the following output:
% Ambiguous command: "show con"
What does this mean?
A. You did not enter enough characters for your device to recognize the command.
B. You did not enter all the keywords or values required by this command.
C. You entered the command incorrectly.
D. Context-sensitive help is unable to help you with this command.
43: You are typing a command into the Cisco IOS. It is more than one terminal line long. What will the IOS do?
A. The router automatically moves the cursor to the next line and uses a caret (^) to indicate the line break.
B. The router truncates the command because commands longer than one line are not allowed.
C. The router automatically scrolls the line to the left and uses a dollar sign ($) to indicate that there is text to the left of the $.
D. The router shortens all the commands to squeeze the command on to the screen.
44: You want to change the size of the command history buffer. Which of the following commands will set it permanently to 100?
A. Router1#terminal history 100
B. Router1#history size 100
C. Router1(config)#terminal history 100
D. Router1(config-line)#history size 100
45: You have configured a description on your serial interfaces. Which of the following commands displays the description? (Choose two.)
A. Show running-config
B. Show flash
C. Show interfaces
D. Show ip protocols
46: You are typing commands into your Cisco IOS on your 3640 router. However, your typing is consistently interrupted by console messages, forcing you to retype. Which of the following commands forces the IOS to retype your original input after it displays the console message?
A. Exec-timeout
B. Logging synchronous
C. Line console
D. Exec message readout
47: You are configuring a router and issue the command interface ethernet 1/0/0. What do the numbers represent?
A. Slot/port/interface
B. Slot/interface/port
C. Port/slot/port number
D. Slot/port adapter/port number
48: Which of the following commands correctly sets the physical speed of a serial interface to 64Kbps?
A. Router1(config-if)#bandwidth 64
B. Router1(config-if)#bandwidth 64000
C. Router1(config-if)#clockrate 64
D. Router1(config-if)#clockrate 64000
49: In what mode do you use the encapsulation command?
A. Interface Configuration mode
B. Sub-interface Configuration mode
C. User mode
D. Privileged mode
50: You are configuring your router, and your boss happens to look over your shoulder as you type a show running-config command. She sees one of the lines that says password 7 14361F009A056E7D and asks what this means. What do you tell her?
A. It is the actual password.
B. It is the result of a service password-encryption command.
C. The console output made a mistake.
D. It is the result of an enable secret command.