CCNA Practice Test 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

the client's local DNS server

A client issues a DNS request to its local DNS server. The local DNS server does not have the information required. Which entity will send a DNS response to the client?

ESP protocol with the 3DES encryption algorithm

A company needs to implement a secure VPN solution using IPsec. Which protocol and encryption algorithm should be used to guarantee VPN confidentiality?

Encryption uses an optional Advanced Encryption Standard (AES) and Encryption uses the Temporal Key Integrity Protocol (TKIP)

What are two characteristics of a pre-shared key wireless implementation? (Choose two.)

traffic class and type of service (ToS)

What are two field names corresponding to the IPv4 header field and the IPv6 header field that contain Differentiated Services Code Point (DSCP) markings? (Choose two.)

assurance and automation

What are two main tools of the Cisco Digital Network Architecture (DNA) Center? (Choose two.)

IPsec requires dedicated software installed on client hosts. TLS can be used for encrypting traffic to public websites.

What are two reasons for choosing Transport Layer Security (TLS) over IP Security (IPsec) encryption? (Choose two.)

a set of techniques for traffic shaping

What does the term per-hop behavior (PHB) signify?

110

What is the administrative distance of OSPF?

300 seconds

What is the default aging timer value on Cisco switches?

NETCONF

What is the latest and one of the most popular network configuration protocols?

15

What is the maximum stratum level that you can configure on a Cisco device?

to route traffic between company VLANs

What is the purpose of a Layer 3 switch?

To prevent path loops.

What is the purpose of the blocking state of ports in STP (Spanning Tree Protocol)?

They become inactive.

When a particular VLAN is deleted, what happens to interfaces that were assigned to the deleted VLAN?

AND

When a router is calculating the network portion of an IPv4 address, which bitwise operation is performed on the IPv4 address and the subnet mask?

learning and listening

When an access port is enabled with the PortFast feature, which two STP states are bypassed? (Choose two.)

extended and standard

When configuring a trunk port on a Cisco switch, which VLAN ranges can be used to specify the allowed VLANs?

Choosing the highest IPv4 address on an active interface

When determining the OSPF router ID, what is the last action that the router will perform?

management access and network access

When using a AAA server along with an access switch, which two features benefit from centralized authentication? (Choose two.)

acknowledgment

Which 802.11 frame is a control frame?

clear ip ospf process

Which Cisco command can you use to reset the OSPF neighbor adjacencies and DR/BDR election results?

4xx

Which HTTP status code category represents response codes indicating client errors?

fe80::/10

Which IPv6 network prefix is only intended for local links and cannot be routed?

show ip dhcp pool

Which command would you use to verify the number of excluded addresses on a router configured as a DHCP server?

per-VLAN STP instance

Which feature of PVST+ is not available in RSTP?

json.loads(input)

Which instruction should you use to parse a JSON string in Python?

255.255.255.255

Which is the correct subnet mask for a host route?

YANG

Which language is used in the Cisco Network Services Orchestrator (NSO) to describe the network service intent?

Remote Procedure Call (RPC)

Which mechanism does NETCONF use to install, manipulate, and delete the configuration of network devices?

router

Which of the following network devices defines a broadcast domain and a collision domain on every one of its ports?

Designated router/Border designated router (DR/BDR) election

Which part of the Open Shortest Path First (OSPF) process is omitted if two routers are connected with a point-to-point link?

DPP is used with IoT devices to make the provisioning process easier.

Which statement is true about using the Device Provisioning Protocol (DPP) to provision wireless devices?

Offline attacks are more dangerous because there is no external authentication system

Which statement regarding online and offline password attacks is true?

device software management

Which task controls the download and deployment of software updates?

InformRequest Response Trap

Which three SNMP messages are sent from an SNMP agent to an SNMP manager? (Choose three.)

802.11a, 802.11ac, and 802.11n

Which three Wi-Fi standards support the 5 GHz spectrum? (Choose three.)

It carries untagged frames, It modifies the 802.3 frame, and It uses an internal tagging mechanism

Which three characteristics apply to the 802.1Q protocol? (Choose three.)

It is agentless, It is written in Python, and It uses YAML definitions

Which three characteristics differentiate Ansible from other automation tools? (Choose three.)

protocol version, status code, and status message

Which three elements are parts of an HTTP status line? (Choose three.)

destination port, flags, and window size

Which three fields are included in a TCP header? (Choose three.)

A: supplicant, B: authenticator, C: authentication server.

Refer to the exhibit. In an 802.1X implementation, what are the roles of the devices shown?

The service provider is implementing MPLS L3VPN and The service provider network can be represented as a router from the customer perspective.

Refer to the exhibit. The service provider is implementing Multiprotocol Label Switching Virtual Private Network (MPLS VPN) service. Which two options indicate the specific VPN type that is implemented and how the service provider appears from the perspective of the customer? (Choose two.)

option 1 and option 5

Refer to the exhibit. Which two options are common IPsec or SSL VPN implementations? (Choose two.)

Error

The console of a device you are administering displays the following syslog message: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to down What is the severity level of the displayed syslog message?

Hello value is 10 seconds, dead value is 40 seconds

What are the default OSPF hello and dead timer values on point-to-point links?

It is easier to scale and The oversubscription of links is reduced

What are the two main benefits of using spine-leaf architecture compared to traditional data center architectures, which use virtual Port Channel (vPC)? (Choose two.)

It generates link-local addresses, It generates global unicast IPv6 addresses, and It relies on ICMPv6 router advertisements

A device has been assigned an IPv6 address through the Stateless Address Autoconfiguration (SLAAC) process. Which three statements about SLAAC are correct? (Choose three.)

2-way

After a designated router (DR) and backup designated router (BDR) are selected on the multi-access segment in an OSPF routing domain, what is the OSPF state of the routers that are not elected as DR or BDR?

each multi-access segment

For which network entity is the OSPF designated router/border designated router (DR/BDR) selection performed?

By providing individualized login to specific network devices

How can a RADIUS server enhance management security in wireless environments?

all of them

How many switch ports are designated ports on a root bridge?

1

In Cisco PVST+, how many root ports per VLAN are allowed on a device?

It identifies the trustworthiness of the route source.

In Cisco routing implementations, what is the role of the administrative distance?

WPA3

In a wireless IEEE 802.11 implementation, what is the most secure option to protect user traffic?

UDP port 161 UDP port 162

In order to allow SNMP traffic to flow throughout the network, which two communication scenarios must be allowed? (Choose two.)

Cisco routers Cisco switches Cisco Wireless LAN Controllers

In the Cisco Software-Defined Access solution, which three network elements are used to build the underlay network? (Choose three.)

ipv6 unicast-routing

On Cisco routers, routing for IPv6 is not enabled by default. Which command should you use to enable IPv6 routing?

console line

On a Cisco device, what is the default destination for syslog logging messages?

show ipv6 route

On a Cisco router, which command should you use to display the IPv6 routing table?

show interfaces status and show interfaces trunk

On a Cisco switch, which two commands would you use to identify ports that are configured as trunks? (Choose two.)

required bandwidth, tolerable jitter, and tolerable packet loss

Which three of the following application characteristic values are determined in the service level specification phase when designing the quality of service (QoS) policy of a network? (Choose three.)

access control, authentication, and data confidentiality

Which three security services does the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) provide? (Choose three.)

They are automatically created by the device, They are multicast addresses, and They have a recognizable prefix.

Which three statements describes characteristics of solicited-node IPv6 addresses? (Choose three.)

amplification and reflection

Which two attack categories does the smurf attack belong to? (Choose two.)

DMVPN creates hub-to-spoke tunnels and DMVPN creates spoke-to-spoke tunnels

Which two statements about the Dynamic Multipoint Virtual Private Network (DMVPN) are true? (Choose two.)

HTTP PUT updates or modifies an existing resource. HTTP PUT creates a new resource.

Which two statements about the HTTP PUT request method are correct? (Choose two.)

rollover and USB

Which two types of cables can be used to connect to the console port of a Cisco router? (Choose two.)

link-local address

Which type of address is automatically assigned to a physical interface when IPv6 is enabled on that interface?

Multimode Fiber

Which type of cable is typically used to connect a core switch with a data center switch, where bandwidth higher than 40 Gbps and low cost are required?


संबंधित स्टडी सेट्स

Acctg 432 Exam 1: Revenue Cycle Flowchart

View Set

Medication Administration Test - Dosage Calculation and Safe Medication Administration 3.0

View Set

business short questions 2015-2007

View Set

Dynamics of Addiction Exam 1 Study

View Set

4.13 Unit Test: Chemical Thermodynamics - Part 1

View Set

A&P I - Practical 2 (Bones/Innervations/Etc.)

View Set

Unit 1 Civics Study Guide Lee Ballengee

View Set

CH 9 - Health Insurance Policy Provision, Riders & Exclusions

View Set