Ccna HW
Ccna HW
Ccna HW
A network engineer must create a diagram of a multivendor network.which command must be configured on the
Cisco devices so that the topology of the network
can be mapped?
A. Device(config)#lldp run
B. Device(config)#cdp run
C. Device(config)# cdp enable
D. Device(config)# flow-sampler-map topology
2
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access
from specific networks?
A. CPU ACL
B. TACACS
C. Flex ACL
D. RADIUS
When a site-to-site VPN is used, which protocol is responsible for the transport of user data?
A. IKEv2
B. IKEv1
C. IPsec
D. MD5
How do TCP and UDP differ in the way that they establish a connection between two endpoints?
A. TCP use the three-way handshake,and UDP dose no guarantee message delivery
B. TCP use synchronization packets,and UDP uses acknowledgement packets
C. UDP provides reliable message transfer,and TCP is a connectionless protocol.
D. UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.
5
What are two reasons that cause late collisions to increment on an Ethernet interface?(choose
two)
A. when the sending device waits 15 seconds before sending the frame again
B. when the cable length limits are exceeded
C. when one side of the connection is configured for half-duplex
D. when Carner Sense Multiple AccessCollision Detection is used
E. when a collision occurs after the 32nd byte of a frame has been transmitted
A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by
the phone?
7
Refer to the exhibit. The show ip ospf interface command has been executed on R1 How is
OSPF configured?
When a floating static route is configured, which action ensures that the backup route is used
when the primary route fails?
A. The floating static route must have a higher administrative distance than the primary route so
it is used as a backup
B. The administrative distance must be higher on the primary route so that the backup route
becomes secondary.
C. The floating static route must have a lower administrative distance than the primary route so it
is used as a backup
D. The default-information originate command must be configured for the route to be installed
into the routing table
:
10
Which mode must be used to configure EtherChannel between two switches without using a
negotiation protocol?
A. on
B. auto
C. active
D. desirable
11
12
Refer to the exhibit.which statement explains the configuration error message that is received?
13
15
Refer to the exhibit. The default-information originate command is configured under the R1 OSPF
configuration.After testing,workstation on VLAN 20 at Site B cannot reach a DNS server on the Internet.
which action corrects the configuration issue?
17
Which two command sequences must you configure on a switch to establish a Layer 3 EtherChannel with an open-
standard protocol?(choose two)
A. interface GigabitEthernet001
Channel-group 10 mode active
B. interface GigabitEthernet001
Channel-group 10 mode auto
C. interface GigabitEthernet001
Channel-group 10 mode on
D. interface port-channel 10
no switchport
ip address 172.16.0.1 255.255.255.0
E. interface port-channel 10
switchport
Switchport mode trunk
18
Which command prevents passwords from being stored in the configuration as plaintext on a
router or switch?
A. enable secret
B. service password-encryption
C. username Cisco password encrypt
D. enable password
19
R1 has learned route 10.10.10.024 via numerous routing protocols,which route is installed?
20
which network allows devices to communicate without the need to access the internet?
A. 172.9.0.016
B. 172.28.0.016
C. 192.0.0.018
D. 209.165.201.024
21
Which attribute does a router use to select the best path when two or more different routes to the
same destination exist from two different routing protocols?
A. dual algorithm
B. metric
C. administrative distance
D. hop count
22
A. ntp master
B. ntp sever
C. ntp authenticate
D. ntp peer
23
When OSPF learns multiple paths to a network, how does it select a route?
A. It multiple the active K value by 256 to calculate the route with the lowest metric.
B. For each existing interface, it adds the metric from the source router to the destination to
calculate the route with the lowest
bandwidth.
C. It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface
to calculate the router with the lowest
cost.
D. It countthe umber of hops between the source router and the destination to determine the
router with the lowest metric
24
Which two outcomes are predictable behaviors for HSRP? (Choose two)
A. The two routers share a virtual IP address that is used as the default gateway for devices on the
LAN.
B. The two routers negotiate one router as the active router and the other as the standby router
C. Each router has a different IP address both routers act as the default gateway on the LAN, and
traffic is load balanced between
them.
D. The two routers synchronize configurations to provide consistent packet forwarding
E. The two routed share the same IP address, and default gateway traffic is load-balanced
between them
26
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC
address of that interface?
27
28
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are
required?
A. A spine switch and a leaf switch can be added with redundant connections between them
B. A spine switch can be added with at least 40 GB uplinks
C. A leaf switch can be added with connections to every spine switch
D. A leaf switch can be added with a single connection to a core spine switch
29
Refer to the exhibit.Router R1 is running three different routing protocols.Which route characteristic is used by the
router to forward the packet that receives for destination IP 172.16.32.1?
A. metric
B. longest prefix
C. cost
D. administrative distance
30
Which configuration is needed to generate an RSA key for SSH on a router?
31
A. overlay
B. northbound
C. underlay
D. southbound
32
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1.which configuration
accomplishes this task?
A. R1# config t
R1(config)# ip routing
R1(config)# ip route default-route 192.168.1.1
B. R1# config t
R1(config)# ip routing
R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1
C. R1# config t
R1(config)# ip routing
R1(config)# ip route 192.168.1.1 0.0.0.0 0.0.0.0
D. R1# config t
R1(config)# ip routing
R1(config)# ip default-gateway 192.168.1.1
33
34
An engineer must configure a 30 subnet between two routers.which usable IP address and subnet mask combination
meets this criteria?
A. interface e00
description to HQ-A370:98968
ip address 10.2.1.3 255.255.255.252
B. interface e00
description to HQ-A370:98968
ip address 192.168.1.1 255.255.255.248
C. interface e00
description to HQ-A370:98968
ip address 172.16.1.4 255.255.255.248
D. interface e00
description to HQ-A370:98968
ip address 209.165.201.2 255.255.255.252
35
Which unified access point mode continues to serve wireless clients after losing connectivity to
the Cisco Wireless LAN Controller?
A. sniffer
B. mesh
C. flexconnect
D. local
36
Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel
configured?
A. passive
B. mode on
C. auto
D. active
37
which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?
A. TKIP encryption
B. SAE encryption
C. AES encryption
D. scrambled encryption key
38
Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi01
interface of Router1.The new circuit
uses eBGP and teams the route to VLAN25 from the BGP path. What is the expected behavior
for the traffic flow for route
10.10.13.025?
A. Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces
B. Route 10.10.13.025 is updated in the routing table as being learned from interface Gi01.
C. Traffic to 10.10.13.025 is a symmetrical
D. Route 10.10.13.025 learned via the Gi00 interface remains in the routing table
39
Refer to the exhibit.How does router R1 handle traffic to 192.168.10.16?
A. It selects the EIGRP route because it has the lowest administrative distance
B. It selects the RIP route because it has the longest prefix inclusive of the destination address
C. It selects the OSFP route because it has the lowest cost
D. It selects the IS-IS route because it has the shortest prefix inclusive of the destination address
40
Which two actions influence the EIGRP route selection process? (Choose two)
A. The router calculates the reported distance by multiplying the delay on the exiting Interface by
256.
B. The router calculates the best backup path to the destination route and assigns it as the feasible
successor.
C. The router calculates the feasible distance of all paths to the destination route
D. The advertised distance is calculated by a downstream neighbor to inform the local router of
the bandwidth on the link
E. The router must use the advertised distance as the metric for any given route
41
Refer to the exhibit.which two commands were used to create port channel 10?(choose two)
A. int range g00-1
Channel-group 10 mode active
B. Bint range g00-1
Channel-group 10 mode desirable
C. int range g00-1
Channel-group 10 mode passive
D. int range g00-1
Channel-group 10 mode auto
E. int range g00-1
Channel-group 10 mode on
42
What is a difference between RADIUS and TACACS+?
A. TACACS+ encrypts only password information and RADIUS encrypts the entire payload
B. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and
interim commands
C. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of
authentication
D. TACACS+ separates authentication and authorization, and RADIUS merges them
43
Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the
web server via HTTP. All other
computers must be able to access the web server.Which configuration when applied to switch A
accomplishes this task?
A.
B.
C.
D.
44
Refer to the exhibit. How does the router manage traffic to 192.168.12.16?
A. It selects RIP route because it has the longest prefix inclusive of the destination address
B. It chooses the EIGRP route because it has the lowest administrative distance
C. It load-balances traffic between all three routes
D. It chooses the OSPF route because it has the longest prefix inclusive of the destination address
45
What is an advantage of Cisco DNA Center versus traditional campus device management?
46
While examining excessive traffic on the network,it is noted that all incoming packets on an
interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two
misconfigurations cause this behavior? (Choose two)
47
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
A. disabling TPC so that access points can negotiate signal levels with their attached wireless
devices.
B. setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
C. allocating non overlapping channels to access points that are in close physical proximity to
one another
D. configuring access points to provide clients with a maximum of 5 Mbps
48
How do traditional campus device management and Cisco DNA Center device management differ in regards to
deployment?
A. Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device
management options
B. Traditional campus device management schemes can typically deploy patches and updates more quickly than
Cisco DNA Center device management.
C. Cisco DNA Center device management can deploy a network more quickly than traditional campus device
management
D. Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center
device management.
49
Which two actions are performed by the Weighted Random Early Detection mechanism?
(Choose two)
50
A. The user swipes a key fob, then clicks through an email link
B. The user enters a user name and password, and then clicks a notification in an authentication
app on a mobile device
C. The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login
scre
D. The user enters a user name and password and then re-enters the credentials on a second
screen