CCNA Study

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Consider the following static route configured on a Cisco router: ipv6 route 2001:db8:acad:4::/64 2001:db8:acad:3::2 What remote network is specified in this route?

2001:db8:acad:4::/64

A technician must accommodate at least 500 subnets from address 172.16.0.0/16. What is an appropriate subnet mask and corresponding number of available host IP addresses per subnet to meet the requirement?

255.255.255.128 and 126 hosts

A network administrator is designing an IPv4 addressing scheme and requires these subnets. 1 subnet of 100 hosts 2 subnets of 80 hosts 2 subnets of 30 hosts 4 subnets of 20 hosts Which combination of subnets and masks will provide the best addressing plan for these requirements?

3 subnets of 126 hosts with a 255.255.255.128 mask 6 subnets of 30 hosts with a 255.255.255.224 mask

Two students are discussing routers and one statement that is said between them is accurate. Which statement is that?

A default route provides a way for packets that do not match a specific route in the routing table to be forwarded.

What is the purpose of setting the native VLAN separate from data VLANs?

A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs.

A group of network technicians is discussing IPv6 multicast processes. What is a feature of one type of IPv6 multicast address that should be discussed?

A solicited-node multicast address is similar to the all-routers multicast address.

What characteristic describes how data or voice VLANs are configured on a network?

A switch port that has been configured in access mode can only belong to one data VLAN at a time.

Which feature or function does an AP provide in a wireless LAN?

A wireless device has to be associated to an AP in order to have access to network resources.

A network administrator is using the Cisco DNA Center to monitor network health and to troubleshoot network issues. Which area should the administrator use to perform these tasks?

ASSURANCE

A network engineer is designing a borderless switched network in a hierarchical fashion. Which guideline might cause the engineer to implement a three-tier layer model?

Access layer L2 switches connect to distribution layer L3 switches, which implement routing, quality of service, and security.

A technician needs to add a new wireless device to a small WLAN. The WLAN is a mixture of old and newer 802.11b and 802.11g devices. What choice for the new device would provide the most interoperability for present and future growth?

Add a new 802.11n device.

Listening state

After the blocking state, a port will move to the listening state. The port receives BPDUs to determine the path to the root. The switch port also transmits its own BPDU frames and informs adjacent switches that the switch port is preparing to participate in the active topology.

What defines a host route on a Cisco router?

An IPv4 static host route configuration uses a destination IP address of a specific device and a /32 subnet mask.

What is the most likely cause when the output of the show interface command shows that a switch interface is up but the line protocol is down?

An encapsulation type mismatch exists.

Which two configuration management tools are developed using Python? (Choose two.)

Ansible SaltStack

Which LAN attack allows for identification of connected Cisco devices which are sending unencrypted broadcasts?

CDP reconnaissance

A network engineer is giving a tour of the company network operations center to a college class. The engineer is trying to describe how a WAN and connectivity to the internet relate to the network infrastructure. Which statement correctly describes network infrastructure and network communication?

Communication across the internet requires application of recognized technologies and standards.

What is the recommended Cisco best practice for configuring an OSPF-enabled router so that each router can be easily identified when troubleshooting routing issues?

Configure a value using the router-id command.

When testing a new web server, a network administrator cannot access the home page when the server name is entered into a web browser on a PC. Pings to both the IPv4 and IPv6 addresses of the server are successful. What could be the problem?

DNS is not resolving the server name to an IPv4 or IPv6 address.

What are two syntax rules for writing a JSON array? (Choose two.)

Each value in the array is separated by a comma. Values are enclosed in square brackets.

A network engineer is configuring a Cisco switch when this message is displayed. %LINK-3-UPDOWN: Interface Port-channel1, changed state to up What is the Syslog severity level of this message?

Error

Which is a characteristic of EtherChannel?

EtherChannel uses physical ports that have been upgraded to provide a faster connection.

An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?

Issue the shutdown command followed by the no shutdown command on the interface.

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?

It allows many inside hosts to share one or a few inside global addresses.

What is a benefit of PortFast configured on a Cisco switch port?

It allows the port to avoid a 30 second delay to access the network by immediately transitioning from disabled to forwarding state.

A network administrator is considering whether PoE features are required in a specific network installation. Which option provides valid information about PoE?

It can be used by IP phones, allowing them to be installed anywhere that there is an Ethernet cable.

What characterizes a floating static route?

It is a less trustworthy route than the primary route.

A network engineer is designing a borderless switched network in a hierarchical fashion. Why might the engineer consider using a two-tier layer model?

It is recommended in smaller campus locations where there are fewer users accessing the network.

An instructor is reviewing student answers on a previous term exam to prepare for a lecture on IPv6. What would be a good point for the instructor to make when explaining an IPv6 GUA (global unicast address)?

It is routable on the IPv6 internet.

A network engineer is examining the routing table of a Cisco router. Consider the following routing table entry: S 10.2.2.0/30 [1/0] via 10.1.1.2, 00:00:13, Serial0/0/0

It is the interface R4 uses to send data that is destined for 10.2.2.0/30.

What is an architectural constraint to which a true RESTful API web service must adhere?

It runs as client/server model.

In a controller-based wireless network, the WLC device may have multiple ports connected to a switch to form a bundle that provides load-balancing and redundancy. Which protocol supports the port bundle between a Cisco WLC and a Cisco switch?

LAG

When an end device requests services from a DHCPv4 server it receives a host IPv4 address and a subnet mask. Which two other IPv4 addresses are also typically provided to a DCHPv4 client? (Choose two.)

LAN default gateway address DNS server address

A network administrator is configuring the SNMP function on a Cisco 3500 series WLC. The task is to add an SNMP trap server to which this WLC will forward SNMP log messages. Which tab should the administrator use to add the SNMP trap server information?

MANAGEMENT

A network engineer wants to synchronize the time of a router with an NTP server at the IPv4 address 209.165.200.225. The exit interface of the router is configured with an IPv4 address of 192.168.212.11. Which global configuration command should be used to configure the NTP server as the time source for this router?

ntp server 209.165.200.225

Which term describes the process of managing configuration changes of network devices in an orderly fashion?

orchestration

Which ACE would permit traffic from hosts only on the 192.168.8.0/22 subnet?

permit 192.168.8.0 0.0.3.255

SNMP has been implemented on a network to monitor and manage devices. Which SNMP authentication process is preferred when SNMP managers communicate with SNMP agents?

plain-text community string

Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices?

private

A pharmaceutical company wants to contract the services of a cloud provider to store employee data and company-specific applications with strict access security. Which type of cloud would be the most appropriate for this scenario?

private cloud

An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?V

shutdown

What are two load-balancing methods in the EtherChannel technology? (Choose two.)

source IP to destination IP source MAC to destination MAC

In an Intent-Based Networking architecture, which two items are considered parts of an overlay fabric? (Choose two.)

switch router

What characteristic completes the following statement? When an IPv6 static route is configured, the use of a link-local address as a next-hop address requires entering ......

the interface type and interface number.

What characteristic completes the following statement? When an IPv6 static route is configured, it is possible that the same IPv6 link-local address is used for ......

the next-hop address of two different adjacent router

A network administrator configures a router with the ipv6 route ::/0 Serial2/0 command. What is the purpose of this command?

to forward packets destined for the network ::/0 to the serial 2/0 interface

Two recent networking graduates from a local college have just been hired by a communication company to work on various network cabling projects throughout the state. Why would the company consider using fiber-optic cabling in long-haul networks?

to provide connectivity between countries or between cities

What is the purpose of a First Hop Redundancy Protocol?

to provide two or more routers working together, sharing an IP and MAC address of a virtual default gateway

Which function of the Cisco intent-based networking system (IBNS) enables network operators to express the expected networking behavior that will best support the business intent?

translation

A network engineer is using SNMP manager software to monitor and manage network performance. In addition to polling network devices at regular time intervals, the engineer is configuring the devices to generate messages that inform the SNMP manager of specified events. What message type is configured on those devices that allows them to send unsolicited messages?

trap

In a controller-based wireless network, a Cisco WLC device has four ports connected to a switch to form a bundle. This bundle will provide load balancing and redundancy. Which two configurations must be performed on the four switch ports that connect to the WLC? (Choose two.)

trunking mode EtherChannel

In a controller-based wireless network, a Cisco WLC device has four ports connected to a switch to form a bundle. This bundle will provide load-balancing and redundancy. Which two configurations must be performed on the four switch ports that connect to the WLC? (Choose two.)

trunking mode EtherChannel

When configuring a switch for SSH access, what other command that is associated with the login local command is required to be entered on the switch?

username username secret secre

In FHRP terminology, what represents a set of routers that present the illusion of a single router to hosts?

virtual router

What term describes a process where a router simply discards any packet that arrives at the end of a queue that has completely used up its packet-holding resources?

weighted fair queuing (WFQ)

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified?

when the next hop is a link-local address

In an OSPF network when are DR and BDR elections required?

when the routers are interconnected over a common Ethernet network

An employee is logging into a company account and another employee stands in such a way to see the account ID and password. Which kind of threat is this?

identity theft

Which is a QoS model that a network engineer would implement to ensure a source to destination quality of service standard for a specified data flow?

integrated services

A technician is troubleshooting a network device and suspects there might be a duplex mismatch. What could cause a duplex mismatch?

interface misconfiguration

Which security solution identifies incoming threats and blocks them from entering the corporate network?

intrusion prevention systems

A network engineer has been asked to prepare a router and to ensure that it can route IPv6 packets. Which command should the network engineer ensure has been entered on the router?

ipv6 unicast-routing

Which statement is an accurate description of a VPN type?

In a Client-based VPN, users initiate a connection using VPN client software and the VPN gateway does the data encryption.

Forwarding state

In the forwarding state, a switch port is considered part of the active topology. The switch port forwards user traffic and sends and receives BPDU frame

A programmer is using Ansible as the configuration management tool. Which term is used to describe a set of instructions for execution?

Playbook

A network administrator of a college is configuring WLAN security with WPA2 Enterprise authentication. Which server is required when deploying this type of authentication?

RADIUS

The routing table of a Cisco router has four static routes for network 10.0.0.0. Which route is the best match for a packet entering the router with a destination of 10.16.0.10?

S 10.16.0.0/24 [1/0] via 202.16.0.2

A network administrator is configuring a WLAN with WPA2 Enterprise on a Cisco 3500 series WLC. Client authentications will be handled by a RADIUS server. Which tab should the administrator use to add the RADIUS server information?

SECURITY

A technician is reviewing a report of slowness during peak traffic periods and is looking at performance on a particular switch. What should the technician be aware of about memory buffering on a switch?

Shared memory allows traffic received on one port to be transmitted to another port without moving the data to a different queue.

Students in a data networking class are reviewing materials in preparation for a quiz. Which statement describes the operation of an access control method for shared network media?

The CSMA/CA method attempts to avoid collisions by having each device informing others how long the media will be unavailable.

Disabled state

The port does not participate in spanning tree and does not forward frames.

Learning state

The port prepares to participate in frame forwarding and begins to populate the MAC address table.

Blocking state

The port receives BPDU frames but does not forward frames.

What action takes place when the source MAC address of a frame entering a switch is not in the MAC address table?

The switch adds the MAC address and incoming port number to the table.

What action takes place when a frame entering a switch has a unicast destination MAC address appearing in the MAC address table?

The switch forwards the frame out of the specified port.

What action takes place when a frame entering a switch has a multicast destination MAC address?

The switch will forward the frame out all ports except the incoming port.

What are two benefits of using virtualization? (Choose two.)

The virtual machine is no longer dependent on a specific hardware platform. Multiple virtual machines can be running simultaneously on a single physical device.

An administrator needs to implement a 2.4GHz WLAN that requires multiple APs. Which two are characteristics of the 2.4GHz channels? (Choose two.)

There are 11 channels for North America identified by the 802.11b standard. Each channel is allotted 22 MHz bandwidth.

An administrator issues the show vlan brief command on a Cisco switch and the output shows that all ports are currently assigned to the default VLAN. What conclusion can be drawn?

There is a security risk because the management VLAN and the native VLAN are the same.

What are three components used in the query portion of a typical RESTful API request? (Choose three.)

key format parameters

A network engineer is configuring secure remote access to a Cisco router. Which two commands would be issued in the line configuration mode of the router to implement SSH? (Choose two.)

login local transport input ssh

If no bridge priority is configured in PVST, which criteria is considered when electing the root bridge?

lowest MAC address

What is a characteristic of the REST API?

most widely used API for web services

A user is reading a book from the website https://www.books-info.com/author50/book1.html#page150 . Which term is used to describe the component http://www.books-info.com/author50/book1.html ?

URL

Which LAN attack involves the sending of a double-tagged 802.1Q frame to the switch?

VLAN double-tagging attack

Which LAN attack enables traffic from one VLAN to be seen by another VLAN without the aid of a router?

VLAN hopping attack

Which two protocols provide gateway redundancy at Layer 3? (Choose two.)

VRRP HSRP

A network administrator is configuring security for new WLANs on a Cisco 3500 series WLC. What is the default protocol used for authentication key management?

WPA2

A wireless network engineer is implementing updated wireless equipment within the company. Which statement describes a wireless security protocol?

WPA2-Enterprise is intended for enterprise networks and users must authenticate using 802.1X standard.

Which two statements describe an Internet-based connectivity option? (Choose two.)

When using a satellite to connect to the internet, the reception of signals can be affected by storms. VPNs provide security for teleworkers who use DSL to access the corporate network through the internet.

What is a difference between autonomous APs and controller-based APs in wireless LANs?

When wireless demands increase, controller-based APs provide a better solution than do autonomous APs.

What characteristic completes the following statement? When an IPv6 static route is configured, and traffic is to be directed to one specific server, the static route requires ...

a destination host route with a /128 prefix.

A network engineer examining the configuration of a Cisco router sees a network entry in a routing table listed with a code O. Which kind of route is this?

a route dynamically learned through the OSPF routing protocol

When two or more routes to the same destination are learned from different routing protocols, what does a router use to choose between the routes?

administrative distance

When configuring a wireless LAN, to which category does a home wireless router belong?

autonomous AP

What two types of always-on internet connections are commonly used by teleworkers to communicate with a company? (Choose two.)

cable DSL

What are the three categories of tools that can be used in IP networks to implement QoS? (Choose three.)

classification and marking congestion management congestion avoidance

Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports?

fa0/21 fa0/10 fa0/13

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

gateway of last resort

How are network data transmissions calculated?

goodput + traffic overhead = throughput


Ensembles d'études connexes

Fungal Infections of Skin - Microbiology

View Set

Organizational Behavior: Mid Term 1

View Set

AP Psychology | Chapter 10: Cognitive Abilities / Testing & Individual Differences

View Set

1/25 Federal Regulation of Medications

View Set

Section 2: Contract Law in Texas

View Set

Yak - Chapter 9 The Supervisor's Function in Organization, Administration, and Management

View Set