CCNA Cert Study Test 2019

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Refer to the exhibit. Packets destined to which two networks will require the router to perform a recursive lookup? (Choose two.)

- 10.0.0.0/8 - 192.168.2.0/24

What are three characteristics of the CSMA/CD process? (Choose three.)

- After detecting a collision, hosts can attempt to resume transmission after a random time delay has expired - All of the devices on a segment see data that passes on the network medium - A device listens and waits until the media is not busy before transmitting

Refer to the exhibit. Static NAT is being configured to allow PC 1 access to the web server on the internal network. What two addresses are needed in place of A and B to complete the static NAT configuration? (Choose two.)

- B = 209.165.201.1 - A = 10.1.0.13

What are two WAN connection enhancements that are achieved by implementing PPPoE? (Choose two.)

- PPP enables the ISP to assign an IP address to the customer WAN interface - CHAP enables customer authentication and accounting

Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server. What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.)

- R1(config-if)# ip helper-address 10.2.0.250 - R1(config)# interface G0/0

Which two protocols are used to provide server-based AAA authentication? (Choose two.)

- RADIUS - TACACS+

What are two reasons why an administrator might choose to use static routing rather than dynamic routing? (Choose two.)

- Static routing is more secure - Static routing uses less router processing and bandwidth

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.)

- The UDP destination port number identifies the application or service on the server which will handle the data - The source port field identifies the running application or service that will handle data returning to the PC - UDP segments are encapsulated within IP packets for transport across the network

Refer to the exhibit. Which three events will occur as a result of the configuration shown on R1? (Choose three.)

- The syslog messages will contain the IP address the GigabitEthernet 0/1 interface - Messages that are sent to the syslog server will be limited to levels 3 or lower - Messages that are sent to the syslog server will use 192.168.1.5 as the destination IP address.

Which three statements characterize UDP? (Choose three.)

- UDP relies on IP for error detection and recovery - UDP is a low overhead protocol that does not provide sequencing or flow control mechanisms - UDP provides basic connectionless transport layer functions

What two STP features are incorporated into Rapid PVST+? (Choose two.)

- UplinkFast - BackboneFast

Refer to the exhibit. Based on this configuration, which two OSPF router roles are assumed by R2? (Choose two.)

- area border router - backbone router

Which two issues might cause excessive runt and giant frames in an Ethernet network? (Choose two.)

- excessive collisions - a malfunctioning NIC

Refer to the exhibit. All the displayed switches are Cisco 2960 switches with the same default priority and operating at the same bandwidth. Which three ports will be STP designated ports? (Choose three.)

- fa0/13 - fa0/21 - fa0/10

An administrator wants to replace the configuration file on a Cisco router by loading a new configuration file from a TFTP server. What two things does the administrator need to know before performing this task? (Choose two.)

- name of the configuration file that is stored on the TFTP server - TFTP server IP address

Which three layers of the OSI model map to the application layer of the TCP/IP model? (Choose three.)

- session - presentation - application

What are two load-balancing methods in the EtherChannel technology? (Choose two.)

- source MAC to destination MAC - source IP to destination IP

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

- the startup configuration file - the configuration register value

A network administrator has been allocated the IPv4 10.10.240.0/20 block of addresses for a LAN. Two devices on two different, but contiguous, subnets on the LAN have been assigned the addresses 10.10.247.1/21 and 10.10.248.10/24, respectively. The administrator has to create a third subnet from the remaining address range. To optimize the use of this address space, the new subnet will follow on directly from the existing subnets. What is the first available host address in the next available subnet?​

10.10.249.1

Refer to the exhibit. A network engineer is troubleshooting host connectivity on a LAN that uses a first hop redundancy protocol. Which IPv4 gateway address should be configured on the host?

192.168.2.100

Refer to the exhibit. Which source address is being used by router R1 for packets being forwarded to the Internet?

209.165.200.225

Which address prefix range is reserved for IPv4 multicast?

224.0.0.0 - 239.255.255.255

How many 64 kb/s voice channels are combined to produce a T1 line?

24

A network administrator is designing an IPv4 addressing scheme and requires these subnets. 1 subnet of 100 hosts 2 subnets of 80 hosts 2 subnets of 30 hosts 4 subnets of 20 hosts Which combination of subnets and masks will provide the best addressing plan for these requirements?

3 subnets of 126 hosts with a 255.255.255.128 mask 6 subnets of 30 hosts with a 255.255.255.224 mask

Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement?

5 deny 172.23.16.0 0.0.15.255

How many /30 subnets can be created from one /27 subnet?

8

Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports?

802.1x

What is the purpose of setting the native VLAN separate from data VLANs?

A separate VLAN should be used to carry uncommon untagged frames to avoid bandwidth contention on data VLANs

What type of installation is needed to view syslog messages?

A syslog server must be installed on a workstation

What is the most likely cause when the output of the show interface command shows that a switch interface is up but the line protocol is down?

An encapsulation type mismatch exists

What effect does the default-information originate command have on a Cisco router that is configured for RIP?

Any default static route that is configured on the router will propagate to other adjacent routers

Packet Tracer Activity. Which task has to be performed on Router 1 for it to establish an OSPF adjacency with Router 2?

Change the subnet mask of interface FastEthernet 0/0 to 255.255.255.0

A network administrator is using the router-on-a-stick model to configure a switch and a router for inter-VLAN routing. What configuration should be made on the switch port that connects to the router?

Configure the port as an 802.1q trunk port

Refer to the exhibit. A network administrator issues the show lldp neighbors command to display information about neighboring devices. What can be determined based on the information?

Device C1 is a switch

How will a router handle static routing differently if Cisco Express Forwarding is disabled?

Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies

Which IPv6 prefix is reserved for communication between devices on the same link?

FE80::/10

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) Packets with destination of 172.17.6.15

Fa0/0

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) Packets with destination of 172.17.14.8

Fa0/1

Refer to the exhibit. A network technician issues the command show vlan to verify the VLAN configuration. Based on the output, which port should be assigned with native VLAN?

Fa0/20

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) Packets with destination of 172.17.12.10

Fa1/0

Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) Packets with destination of 172.17.10.5

Fa1/1

Refer to the exhibit. Which interface on switch S1 should be configured as a DHCP snooping trusted port to help mitigate DHCP spoofing attacks?

G0/23

Refer to the exhibit. What protocol can be configured on gateway routers R1 and R2 that will allow traffic from the internal LAN to be load balanced across the two gateways to the Internet?

GLBP

An administrator who is troubleshooting connectivity issues on a switch notices that a switch port configured for port security is in the err-disabled state. After verifying the cause of the violation, how should the administrator re-enable the port without disrupting network operation?

Issue the shutdown command followed by the no shutdown command on the interface

What is the purpose of the overload keyword in the ip nat inside source list 1 pool NAT_POOL overload command?

It allows many inside hosts to share one or a few inside global addresses.

Which WAN technology can serve as the underlying network to carry multiple types of network traffic such as IP, ATM, Ethernet, and DSL?

MPLS

An OSPFv3 router has no IPv4 addresses configured and the router ID has not been manually set. What is the result of this configuration?

OSPFv3 will not start

Refer to the exhibit. A network administrator is reviewing the configuration of switch S1. Which protocol has been implemented to group multiple physical ports into one logical link?

PAgP

Which technology supports CHAP authentication over a dialer interface?

PPPoE

Refer to the exhibit. Routers R1 and R2 have been configured for PPP using CHAP as the authentication protocol, but the link will not go to the up and up state. What configuration error has been made?

R1 has an incorrect username

Refer to the exhibit. All the routers that are displayed are part of the EIGRP domain. Assuming EIGRP metric weights are not altered in the configurations, which path will a packet take that originates from a host on the 192.168.1.0/24 network and is going to a host on the 192.168.2.0/24 network?

R1, R2, R5, R3

Which is a characteristic of EtherChannel?

STP treats all interfaces in a bundle as a single logical link

Refer to the exhibit. Host A sends a data packet to host B. What will be the addressing information of the data packet when it reaches host B?

Source af:3c:dc:4c:55:66 Destination a0:4c:5f:21:33:77 Source 172.16.1.10 Destination 172.16.2.10

Refer to the exhibit. A network administrator is configuring EIGRP AS 20 on Router_2 and has received the error that is shown. What is the cause of the error?

The IPv6 routing process cannot be implemented until IPv6 routing is enabled

Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Why are users in the OSPF network not able to access the Internet?

The network statement is misconfigured on router R1

Match the port state with its condition. Disabled

The port does not participate in spanning tree and does not forward frames.

Match the port state with its condition. Learning

The port prepares to participate in frame forwarding and begins to populate the MAC address table.

Match the port state with its condition. Blocking

The port receives BPDU frames but does not forward frames.

Refer to the exhibit. Router R1 has recently been configured to operate in an IPv6 only network and is connected via interface Gigabit Ethernet 0/0 to router R2. R2 is configured correctly, but will not form a neighbor relationship with R1 What is the problem?

The router ID has not been created on router R1

Refer to the exhibit. A network administrator is reviewing port and VLAN assignments on switch S2 and notices that interfaces Gi0/1 and Gi0/2 are not included in the output. Why would the interfaces be missing from the output?

They are configured as trunk interfaces

On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

VLAN 1

Which WAN connectivity method would be used in a remote location where there are no service provider networks?

VSAT

Match the FHRP protocols to their description. (Not all options are used.) GLBP

a Cisco proprietary FHRP that provides load sharing in addition to redundancy

Match the FHRP protocols to their description. (Not all options are used.) HSRP

a Cisco proprietary FHRP that provides redundancy through use of an active device and standby device

Match the FHRP protocols to their description. (Not all options are used.) VRRP

an open standard FHRP that provides redundancy through use of a virtual routers master and one or more backups

Which type of IPv6 address refers to any unicast address that is assigned to multiple hosts?

anycast

Which address type is not supported in IPv6?

broadcast

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

gateway of last resort

Refer to the exhibit. A ping to PC3 is issued from PC0, PC1, and PC2 in this exact order. Which MAC addresses will be contained in the S1 MAC address table that is associated with the Fa0/1 port?

just PC0 and PC1 MAC addresses

If no bridge priority is configured in PVST, which criteria is considered when electing the root bridge?

lowest MAC address

Which ACE would permit traffic from hosts only on the 192.168.8.0/22 subnet?

permit 192.168.8.0 0.0.3.255

An IT security specialist enables port security on a switch port of a Cisco switch. What is the default violation mode in use until the switch port is configured to use a different violation mode?

shutdown

What information can be verified through the show ip dhcp binding command?

the IPv4 addresses that are assigned to hosts by the DHCP server

When creating an IPv6 static route, when must a next-hop IPv6 address and an exit interface both be specified?

when the next hop is a link-local address


Set pelajaran terkait

ati learning system 3.0 fundamentals final

View Set

Internal Medicine II Neurology cases

View Set

Elections, Media, and Strategy Midterm

View Set

CIST2613 Ethical Hacking & Pen Testing Midterm Chapters 1-8 Questions

View Set

Adding and Subtracting Complex Numbers

View Set

International Business (Chapter 1-3)

View Set