CCNA 2020

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

interface FastEthernet0/1 switchport trunk encapsulation dot1q switchport trunk native vlan 999 switchport mode trunk interface FastEthernet0/1 switchport trunk encapsulation dot1q switchport trunk native vlan 99 switchport mode trunk A. The trunk does not form and the ports go into an err-disabled status B. The trunk forms but the mismatched native VLANs are merged into a single broadcast domain C. The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link D. The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state

B

Administrative distance 1: connected 2: static 3: EBGP 4: EIGRP 5 :OSPF 6: RIP

1: connected (AD = 0) 2: static (AD = 1) 3: EBGP (AD = 20) 4: EIGRP (AD = 90) 5 :OSPF (AD = 110) 6: RIP (AD = 120)

A network engineer must create a diagram of a multivendor network. Which command must be configured on the Cisco devices so that the topology of the network can be mapped? A. Device(Config)#lldp run B. Device(Config)#cdp run C. Device(Config)#flow-sampler-map topology D. Device(Config-if)#cdp enable

A

Refer to exhibit. Which statement explains the configuration error message that is received? Router(config)#interface GigabitEthernet 1/0/1 Router(config-if)#ip address 192.168.16.143 255.255.255.240 Bad mask /28 for address 192.168.16.143 A. It is a broadcast IP address B. The router does not support /28 mask C. It belongs to a private IP address range D. IT is a network IP address

A

Which command is used to enable LLDP globally on a Cisco IOS ISR? A. lldp run B. lldp enable C. lldp transmit D. cdp run E. cdp enable

A

Which command should you enter to configure an LLDP delay time of 5 seconds? A. lldp reinit 5 B. lldp reinit 5000 C. lldp holdtime 5 D. lldp timer 5000

A

Which mode must be used to configure EtherChannel between two switches without using a negotiation protocol? A. on B. auto C. active D. desirable

A

Which result occurs when PortFast is enabled on an interface that is connected to another switch? A. Spanning tree may fail to detect a switching loop in the network that causes broadcast storms B. VTP is allowed to propagate VLAN configuration information from switch to switch automatically. C. Root port choice and spanning tree recalculation are accelerated when a switch link goes down D. After spanning tree converges PortFast shuts down any port that receives BPDUs.

A

What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two) A. The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addresses B. The DHCP client maintains a pool of IP addresses it can assign C. The DHCP server leases client IP addresses dynamically D. The DHCP client can request up to four DNS server addresses E. The DHCP server assigns IP addresses without requiring the client to renew them

A, C

Which two minimum parameters must be configured on an active interface to enable OSPFv2 to operate? (Choose two) A. OSPF process ID B. OSPF area C. IPv6 address D. OSPF stub flag E. OSPF MD5 authentication key

A,B

Which two statements about the purpose of the OSI model are accurate? (Choose two) A. Defines the network functions that occur at each layer B. Facilitates an understanding of how information travels throughout a network C. Changes in one layer do not impact other layer D. Ensures reliable data delivery through its layered approach

A,B

Which two command sequences must you configure on a switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two) A. interface port-channel 10 no switchport ip address 172.16.0.1 255.255.255.0 B. interface GigabitEthernet0/0/1 channel-group 10 mode on C. interface port-channel 10 switchport switchport mode trunk D. interface GigabitEthernet0/0/1 channel-group 10 mode auto E. interface GigabitEthernet0/0/1 channel-group 10 mode active

A,E

hich two statements about EtherChannel technology are true? (Choose two) A. EtherChannel provides increased bandwidth by bundling existing FastEthernet or Gigabit Ethernet interfaces into a single EtherChannel B. STP does not block EtherChannel links C. You can configure multiple EtherChannel links between two switches, using up to a limit of sixteen physical ports D. EtherChannel does not allow load sharing of traffic among the physical links within the EtherChannel E. EtherChannel allows redundancy in case one or more links in the EtherChannel fail

A,E

CDP and LLDP

CDP and LLDP

An engineer must configure a /30 subnet between two routers. Which usable IP address and subnet mask combination meets this criteria? A. interface e0/0 description to HQ-A371:10975 ip address 172.16.1.4 255.255.255.248 B. interface e0/0 description to HQ-A371:10975 ip address 10.2.1.3 255.255.255.252 C. interface e0/0 description to HQ-A371:10975 ip address 192.168.1.1 255.255.255.248 D. interface e0/0 description to HQ-A371:10975 ip address 209.165.201.2 255.255.255.252

D

By default, how does EIGRP determine the metric of a route for the routing table? A. It uses a default metric of 10 for all routes that are learned by the router B. It counts the number of hops between the receiving and destination routers and uses that value as the metric C. It uses a reference Bandwidth and the actual bandwidth of the connected link to calculate the route metric D. It uses the bandwidth and delay values of the path to calculate the route metric

D

How does Cisco DNA Center gather data from the network? A. Devices use the call-home protocol to periodically send data to the controller B. Devices establish an iPsec tunnel to exchange data with the controller C. The Cisco CU Analyzer tool gathers data from each licensed network device and streams it to the controller D. Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controlle

D

Refer to the exhibit. Which command provides this output? Capability Codes: k - Router, I - Trans Bridge, B - source Route bridge S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID Local Intrfce Holdtme Capability Platform Port ID 10.1.1.2 Gig37/3 176 RI CPT 600 Gig36/41 10.1.1.2 Gig37/1 174 RI CPT 600 Gig36/43 10.1.1.2 Gig36/41 134 RI CPT 600 Gig37/3 10.1.1.2 Gig36/43 134 RI CPT 600 Gig37/1 10.1.1.2 Ten3/2 132 RI CPT 600 Ten4/2 10.1.1.2 Ten4/2 174 RI CPT 600 Ten3/2 A. show ip route B. show ip interface C. show interface D. show cdp neighbor

D

Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to Dynamic Desirable. What is the result of this configuration? A. The link is in a downstate. B. The link is in an error disables stale C. The link is becomes an access port D. The link becomes a trunkport

D

What is a difference between local AP mode and FlexConnet AP mode? A. Local AP mode causes the AP to behave as if it were an autonomous AP B. FlexConnect AP mode fails to function if me AP loses connectivity with the WLC C. FlexConnect AP mode bridges the traffic from the AP to the WLC when local switching is configured D. Local AP mode creates two CAPWAP tunnels per AP to the WLC

D

Refer to the exhibit. An engineer deploys a topology in which R1 obtains its IP configuration from DHCP. If the switch and DHCP server configurations are complete and correct. Which two sets of commands must be configured on R1 and R2 to complete the task? (Choose two) A. R1 (config)# interface fa0/0 R1 (config-if)# ip helper-address 192.0.2.2 B. R1 (config)# interface fa0/0 R1 (config-if)# ip helper-address 198.51.100.100 C. R2(config)# interface gi0/0 R2(config-if)# ip address dhcp D. R1 (config)# interface fa0/0 R1 (config-if)# ip address dhcp R1 (config-if)# no shutdown E. R2(config)# interface gi0/0 R2(config-if)# ip helper-address 198.51.100.100

D,E

Match to cisco DNA or traditional -monitors the cloud for software updates -manages per-device configuration -implements changes via SSH -uses CLI templates -security is managed near the perimeter - uses netflow to analyze potential security threates

DNA: 146 Traditional: 235

While examining excessive traffic on the network, it is noted that all incoming packets on an interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two misconfigurations cause this behavior? (Choose two) A. The packets fail to match any permit statement B. A matching permit statement is too broadly defined C. The ACL is empty D. A matching deny statement is too high in the access list E. A matching permit statement is too high in the access list

E,B

what is the order of OSPF ID selection

Manually configured-highest loopback add-highest IP

How does Cisco DNA Center gather data from the network? A. Network devices use different services like SNMP, syslog, and streaming telemetry to send data to the controller B. Devices establish an iPsec tunnel to exchange data with the controller C. Devices use the call-home protocol to periodically send data to the controller D. The Cisco CU Analyzer tool gathers data from each licensed network device and streams it to the controller

a

What is a function of TFTP in network operations? A. transfers IOS images from a server to a router for firmware upgrades B. transfers files between file systems on a router C. transfers a backup configuration file from a server to a switch using a username and password D. transfers a configuration files from a server to a router on a congested link

a

Which purpose does a northbound API serve in a controller-based networking architecture? A. facilitates communication between the controller and the applications B. communicates between the controller and the physical network hardware C. generates statistics for network hardware and traffic D. reports device errors to a controller

a

deployment? A. Cisco DNA Center device management can deploy a network more quickly than traditional campus device managementcorrect B. Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center device management C. Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device management options D. Traditional campus device management schemes can typically deploy patches and updates more quickly than Cisco DNA Center device management

a

Which two encoding methods are supported by REST APIs? (Choose two) A. JSON B. EBCDIC C. YAML D. SGML E. XML

ae

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode? A. Init B. Full C. Exchange D. 2-way

b

What is the default behavior of a Layer 2 switch when a frame with an unknown destination MAC address is received? A. The Layer 2 switch drops the received frame B. The Layer 2 switch floods packets to all ports except the receiving port in the given VLAN C. The Layer 2 switch sends a copy of a packet to CPU for destination MAC address learning D. The Layer 2 switch forwards the packet and adds the destination MAC address to Its MAC address table

b

What is the destination MAC address of a broadcast frame? A. 00:00:0c:07:ac:01 B. ff:ff:ff:ff:ff:ff C. 43:2e:08:00:00:0c D. 00:00:0c:43:2e:08 E. 00:00:0crfHfrff

b

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols? A. dual algorithm B. administrative distance C. hop count D. metric

b

Which statement identifies the functionality of virtual machines? A. Virtualized servers run most efficiently when they are physically connected to a switch that is separate from the hypervisor B. The hypervisor can virtualize physical components including CPU, memory, and storage C. Each hypervisor can support a single virtual machine and a single software switch D. The hypervisor communicates on Layer 3 without the need for additional resources

b

What are two reasons that cause late collisions to increment on an Ethernet interface? (Choose two) A. when the sending device waits 15 seconds before sending the frame again B. when the cable length limits are exceeded C. when one side of the connection is configured for half-duplex D. when Carrier Sense Multiple Access/Collision Detection is used E. when a collision occurs after the 32nd byte of a frame has been transmitted

b,c

An engineer must configure an OSPF neighbor relationship between router R1 and R3. The authentication configuration has been configured and the connecting interfaces are in the same 192.168.1.0/30 subnet. What are the next two steps to complete the configuration? (Choose two) A. configure the hello and dead timers to match on both sides B. configure both interfaces with the same area ID C. configure the interfaces as OSPF active on both sides D. configure the same router ID on both routing processes E. configure the same process ID for the router OSPF process

bc

In a CDP environment, what happens when the CDP interface on an adjacent device is configured without an IP address? A. CDP operates normally, but it cannot provide any information for that neighbor. B. CDP operates normally, but it cannot provide IP address information for that neighbor. C. CDP uses the IP address of another interface for that neighbor. D. CDP becomes inoperable on that neighbor.

c

Refer to exhibit. How does SW2 interact with other switches in this VTP domain? SW2 vtp domain cisco vtp mode transparent vtp password test interface fastethernet0/1 description connection to SW1 switchport mode trunk switchport trunk encapsulation dot1q A. It processes VTP updates from any VTP clients on the network on its access ports B. It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports C. It forwards only the VTP advertisements that it receives on its trunk ports D. It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports

c

Refer to the exhibit. What is the effect of this configuration? ip arp inspection vlan 2 interface fastethernet 0/1 switchport mode access switchport access vlan 2 A. The switch port remains administratively down until the interface is connected to another switch B. The switch port remains down until it is configured to trust or untrust incoming packets C. The switch port interface trust state becomes untrusted D. Dynamic ARP inspection is disabled because the ARP ACL is missing

c

What is a function of Wireless LAN Controller? A. register with a single access point that controls traffic between wired and wireless endpoints B. use SSIDs to distinguish between wireless clients C. send LWAPP packets to access points D. monitor activity on wireless and wired LANs

c

What is an advantage of Cisco DNA Center versus traditional campus device management? A. It enables easy autodiscovery of network elements m a brownfield deployment B. It supports high availability for management functions when operating in cluster mode C. It supports numerous extensibility options including cross-domain adapters and third-party SDKscorrect D. It is designed primarily to provide network assurance

c

Which configuration is needed to generate an RSA key for SSH on a router? A. Configure VTY access B. Configure the version of SSH C. Assign a DNS domain name D. Create a user with a password

c

Which statement about Link Aggregation when implemented on a Cisco Wireless LAN Controller is true? A. To pass client traffic two or more ports must be configured B. When enabled the WLC bandwidth drops to 500 Mbps C. One functional physical port is needed to pass client traffic D. The EtherChannel must be configured in "mode active"

c

Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two) A. Set the NTP server private key B. Verify the time zone C. Specify the IP address of the NTP server D. Disable NTP broadcasts E. Enable NTP authentication

ce

Cloud and virtualization

cloud and virtualization

A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended? A. VSAT B. ISDN C. Frame Relay D. Ethernet WAN

d

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine? A. platform-as-a-service B. software-as-a-service C. network-as-a-service D. infrastructure-as-a-service

d

How can the Cisco Discovery Protocol be used? A. to allow a switch to discover the devices that are connected to its ports B. to determine the hardware platform of the device C. to determine the IP addresses of connected Cisco devices D. all of the above

d

How does STP prevent forwarding loops at OSI Layer 2? A. TTL B. MAC address forwarding C. Collision avoidance. D. Port blocking

d

In which way does a spine and-leaf architecture allow for scalability in a network when additional access ports are required? A. A spine switch and a leaf switch can be added with redundant connections between them B. A spine switch can be added with at least 40 GB uplinks C. A leaf switch can be added with a single connection to a core spine switch D. A leaf switch can be added with connections to every spine switch

d

Refer to the exhibit. What is the effect of this configuration? ip arp inspection vlan 2 interface fastethernet 0/1 switchport mode access switchport access vlan 2 A. Egress traffic is passed only if the destination is a DHCP server. B. All ARP packets are dropped by the switch C. All ingress and egress traffic is dropped because the interface is untrusted D. The switch discard all ingress ARP traffic with invalid MAC-to-IP address bindings

d

Which action is taken by a switch port enabled for PoE power classification override? A. When a powered device begins drawing power from a PoE switch port a syslog message is generated B. As power usage on a PoE switch port is checked data flow to the connected device is temporarily paused C. If a switch determines that a device is using less than the minimum configured power it assumes the device has failed and disconnects D. If a monitored port exceeds the maximum administrative value for power, the port is shutdown and err-disabled

d

Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices? A. partner B. open C. public D. private

d

A frame that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented? (Choose two) A. runts B. giants C. frame D. CRC E. input errors

d,e

Match: 802.1q double-tagging VLAN-hopping attack disable DTP MAC flooding attack configure DHCP snooping man-in-the-middle spoofing attack configure 802.1x authenticate switch-spoofing VLAN-hopping attack configure the native VLAN with a nondefault VLAN ID

double tagging/vlan hopping -non default vlan switch spoofing- disable DTP Mac flooding -801.1x man in the middle-dhcp snooping

Which Cisco IOS command will indicate that interface GigabitEthernet 0/0 is configured via DHCP? A. show ip interface GigabitEthernet 0/0 brief B. show interface GigabitEthernet 0/0 C. show ip interface GigabitEthernet 0/0 dhcp D. show ip interface dhcp E. show ip interface GigabitEthernet 0/0

e

VLAN and Trunking

vlan and trunking

Which network allows devices to communicate without the need to access the Internet? A. 172.9.0.0/16 B. 172.28.0.0/16 C. 192.0.0.0/8 D. 209.165.201.0/24

B

What is a difference between RADIUS and TACACS+? A. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of authentication B. TACACS+ separates authentication and authorization, and RADIUS merges them C. TACACS+ encrypts only password information and RADIUS encrypts the entire payload D. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commands

B

What is the primary effect of the spanning-tree portfast command? A. It enables BPDU messages B. It minimizes spanning-tree convergence time C. It immediately puts the port into the forwarding state when the switch is reloaded D. It immediately enables the port in the listening state

B

What mechanism carries multicast traffic between remote sites and supports encryption? A. ISATAP B. GRE over IPsec C. IPsec over ISATAP D. GRE

B

How does CAPWAP communicate between an access point in local mode and a WLC? A. The access point must directly connect to the WLC using a copper cable B. The access point has the ability to link to any switch in the network, assuming connectivity to the WLCcorrect C. The access point must be connected to the same switch as the WLC D. The access point must not be connected to the wired network, as it would create a loop

B

Question 1 Refer to the exhibit. Which switch in this configuration will be elected as the root bridge? elect_root_bridge.jpg SW1: 0C:E0:38:00:36:75 SW2: 0C:0E:15:22:05:97 SW3: 0C:0E:15:1A:3C:9D SW4: 0C:E0:18:A1:B3:19 A. SW1 B. SW2 C. SW3correct D. SW4 Explanation As this question did not state about bridge priority so we can assume all of them are using the default priority. Therefore the switch with lowest MAC address wins the election. Question 2 Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using local username and password? Switch(config)#hostname R1 R1(config)#interface FastEthernet0/1 R1(config-if)#no switchport R1(config-if)#ip address 10.100.20.42 255.255.255.0 R1(config-if)#line vty 0 4 R1(config-line)#login A. R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234 B. R1(config)#username admin R1(config-if)#line vty 0 4 R1(config-line)#password p@ss1234 R1(config-line)#transport input telnetwrong C. R1(config)#username admin secret p@ss1234 R1(config-if)#line vty 0 4 R1(config-line)#login local R1(config)#enable secret p@ss1234 D. 1(config)#username admin privilege 15 secret p@ss1234 R1(config-if)#line vty 0 4 R1(config-line)#login local

B

Which command is used to specify the delay time in seconds for LLDP to initialize on any interface? A. lldp timer B. lldp holdtime C. lldp reinit D. lldp tlv-select

C


Ensembles d'études connexes

BUS 312 Chapter 11 Practice Test

View Set

Chapter 14 Transactions and Locking SQL

View Set

Chapter 3 - The Organic Molecules of Life

View Set

MGT 5113, Project Management, Chapter 5

View Set

European History Test 4 Study Guide (Howie's Classs)

View Set