Ccna HW

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

Exam A

A network engineer must create a diagram of a multivendor network.which command must be configured on the
Cisco devices so that the topology of the network
can be mapped?

A. Device(config)#lldp run
B. Device(config)#cdp run
C. Device(config)# cdp enable
D. Device(config)# flow-sampler-map topology

2
Which feature on the Cisco Wireless LAN Controller when enabled restricts management access
from specific networks?

A. CPU ACL
B. TACACS
C. Flex ACL
D. RADIUS

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

A. IKEv2
B. IKEv1
C. IPsec
D. MD5

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

A. TCP use the three-way handshake,and UDP dose no guarantee message delivery
B. TCP use synchronization packets,and UDP uses acknowledgement packets
C. UDP provides reliable message transfer,and TCP is a connectionless protocol.
D. UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.
5

What are two reasons that cause late collisions to increment on an Ethernet interface?(choose
two)

A. when the sending device waits 15 seconds before sending the frame again
B. when the cable length limits are exceeded
C. when one side of the connection is configured for half-duplex
D. when Carner Sense Multiple AccessCollision Detection is used
E. when a collision occurs after the 32nd byte of a frame has been transmitted

A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by
the phone?

A. It allows the traffic to pass through unchanged


B. It drops the traffic
C. It tags the traffic with the default VLAN
D. It tags the traffic with the native VLAN

7
Refer to the exhibit. The show ip ospf interface command has been executed on R1 How is
OSPF configured?

A. The interface is not participating in OSPF


B. A point-to-point network type is configured
C. The default Hello and Dead timers are in use
D. There are six OSPF neighbors on this interface

What benefit does controller-based networking provide versus traditional networking?

A. provides an added layer of security to protect from DDoS attacks


B. combines control and data plane functionality on a single device to minimize latency
C. moves from a two-tier to a three-tier network architecture to provide maximum redundancy
D. allows configuration and monitoring of the network from one centralized point
9

When a floating static route is configured, which action ensures that the backup route is used
when the primary route fails?

A. The floating static route must have a higher administrative distance than the primary route so
it is used as a backup
B. The administrative distance must be higher on the primary route so that the backup route
becomes secondary.
C. The floating static route must have a lower administrative distance than the primary route so it
is used as a backup
D. The default-information originate command must be configured for the route to be installed
into the routing table

:
10

Which mode must be used to configure EtherChannel between two switches without using a
negotiation protocol?

A. on
B. auto
C. active
D. desirable

11

What are two descriptions of three-tier network topologies? (Choose two.)


A. The distribution layer runs Layer 2 and Layer 3 technologies.
B. The network core is designed to maintain continuous connectivity when devices fail.
C. The core layer maintains wired connections for each host.
D. The core and distribution layers perform the same functions
E. The access layer manages routing between devices in different domains.

12

Refer to the exhibit.which statement explains the configuration error message that is received?

A. it belongs to a private IP address range


B. the router dose not support 28 mask
C. it is a network IP address
D. it is a broadcast IP address

13

what is the expected outcome when an EUI-64 address is generated?

A. The seventh bit of original MAC address of the interface is inverted


B. The interface ID is configured as a random 64-bit value
C. The characters FE80 are inserted at the beginning of the MAC address of the interface
D. The MAC address of the interface is used as the interface ID without modification
14

Which function does an SNMP agent perform?


A. It manages routing between Layer 3 devices in a network,
B. It coordinates user authentication between a network device and a TACACS+ or RADIUS server.
C. It sends information about MIB variables in response to requests from the NMS.
D. It requests information from remote network nodes about catastrophic system events.

15

Refer to the exhibit. The default-information originate command is configured under the R1 OSPF
configuration.After testing,workstation on VLAN 20 at Site B cannot reach a DNS server on the Internet.
which action corrects the configuration issue?

A. Add the default-information originate command on R2


B. Add the always keyword to the default-information originate command on R1
C. Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.18 command on R1
D. Configure the ip route 0.0.0.0 0.0.0.0 10.10.10.2 command on R2
16

What are two benefits of network automation? (Choose two)

A. reduced operational costs


B. reduced hardware footprint
C. faster changes with more reliable results
D. fewer network failures
E. increased network security

17

Which two command sequences must you configure on a switch to establish a Layer 3 EtherChannel with an open-
standard protocol?(choose two)

A. interface GigabitEthernet001
Channel-group 10 mode active
B. interface GigabitEthernet001
Channel-group 10 mode auto
C. interface GigabitEthernet001
Channel-group 10 mode on
D. interface port-channel 10
no switchport
ip address 172.16.0.1 255.255.255.0
E. interface port-channel 10
switchport
Switchport mode trunk

18

Which command prevents passwords from being stored in the configuration as plaintext on a
router or switch?

A. enable secret
B. service password-encryption
C. username Cisco password encrypt
D. enable password

19
R1 has learned route 10.10.10.024 via numerous routing protocols,which route is installed?

A. route with the lowest cost


B. route with the shortest prefix length
C. route with the next hop that has the highest IP
D. route with the lowest administrative distance

20

which network allows devices to communicate without the need to access the internet?

A. 172.9.0.016
B. 172.28.0.016
C. 192.0.0.018
D. 209.165.201.024

21
Which attribute does a router use to select the best path when two or more different routes to the
same destination exist from two different routing protocols?

A. dual algorithm
B. metric
C. administrative distance
D. hop count
22

which command must be entered when a device is configured as an NTP server?

A. ntp master
B. ntp sever
C. ntp authenticate
D. ntp peer

23

When OSPF learns multiple paths to a network, how does it select a route?

A. It multiple the active K value by 256 to calculate the route with the lowest metric.

B. For each existing interface, it adds the metric from the source router to the destination to
calculate the route with the lowest
bandwidth.

C. It divides a reference bandwidth of 100 Mbps by the actual bandwidth of the existing interface
to calculate the router with the lowest
cost.

D. It countthe umber of hops between the source router and the destination to determine the
router with the lowest metric

24

What is a characteristic of spine-and-leaf architecture?

A. It provides variable latency.


B. Each link between leaf switches allows for higher bandwidth.
C. Each device is separated by the same number of hops.
D. It provides greater predictability on STP blocked ports.
25

Which two outcomes are predictable behaviors for HSRP? (Choose two)

A. The two routers share a virtual IP address that is used as the default gateway for devices on the
LAN.
B. The two routers negotiate one router as the active router and the other as the standby router
C. Each router has a different IP address both routers act as the default gateway on the LAN, and
traffic is load balanced between
them.
D. The two routers synchronize configurations to provide consistent packet forwarding
E. The two routed share the same IP address, and default gateway traffic is load-balanced
between them

26
Which action must be taken to assign a global unicast IPv6 address on an interface that is derived from the MAC
address of that interface?

A. explicitly assign a link-local address


B. disable the EUI-64 bit process
C. enable SLAAC on an interface
D. configure a stateful DHCPv6 server on the network

27

Refer to the exhibit. What is the effect of this configuration?


A. The switch port interface trust state becomes untrusted
B. The switch port remains administratively down until the interface is connected to another
switch
C. Dynamic ARP inspection is disabled because the ARP ACL is missing
D. The switch port remains down until it is configured to trust or untrust incoming packets

28
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are
required?

A. A spine switch and a leaf switch can be added with redundant connections between them
B. A spine switch can be added with at least 40 GB uplinks
C. A leaf switch can be added with connections to every spine switch
D. A leaf switch can be added with a single connection to a core spine switch

29

Refer to the exhibit.Router R1 is running three different routing protocols.Which route characteristic is used by the
router to forward the packet that receives for destination IP 172.16.32.1?

A. metric
B. longest prefix
C. cost
D. administrative distance
30
Which configuration is needed to generate an RSA key for SSH on a router?

A. Configure the version of SSH


B. Configure VTY access.
C. Create a user with a password
D. Assign a DNS domain name

31

Which API is used in controller-based architectures to interact with edge devices?

A. overlay
B. northbound
C. underlay
D. southbound

32
Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1.which configuration
accomplishes this task?

A. R1# config t
R1(config)# ip routing
R1(config)# ip route default-route 192.168.1.1
B. R1# config t
R1(config)# ip routing
R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1
C. R1# config t
R1(config)# ip routing
R1(config)# ip route 192.168.1.1 0.0.0.0 0.0.0.0
D. R1# config t
R1(config)# ip routing
R1(config)# ip default-gateway 192.168.1.1
33

What is a benefit of using a Cisco Wireless LAN Controller?

A. Central AP management requires more complex configurations


B. Unique SSIDs cannot use the same authentication method
C. It supports autonomous and lightweight APs
D. It eliminates the need to configure each access point individually

34

An engineer must configure a 30 subnet between two routers.which usable IP address and subnet mask combination
meets this criteria?

A. interface e00
description to HQ-A370:98968
ip address 10.2.1.3 255.255.255.252
B. interface e00
description to HQ-A370:98968
ip address 192.168.1.1 255.255.255.248
C. interface e00
description to HQ-A370:98968
ip address 172.16.1.4 255.255.255.248
D. interface e00
description to HQ-A370:98968
ip address 209.165.201.2 255.255.255.252

35

Which unified access point mode continues to serve wireless clients after losing connectivity to
the Cisco Wireless LAN Controller?
A. sniffer
B. mesh
C. flexconnect
D. local

36

Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel
configured?

A. passive
B. mode on
C. auto
D. active

37

which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network?

A. TKIP encryption
B. SAE encryption
C. AES encryption
D. scrambled encryption key

38

Refer to the exhibit. An engineer is bringing up a new circuit to the MPLS provider on the Gi01
interface of Router1.The new circuit
uses eBGP and teams the route to VLAN25 from the BGP path. What is the expected behavior
for the traffic flow for route
10.10.13.025?
A. Traffic to 10.10.13.0.25 is load balanced out of multiple interfaces
B. Route 10.10.13.025 is updated in the routing table as being learned from interface Gi01.
C. Traffic to 10.10.13.025 is a symmetrical
D. Route 10.10.13.025 learned via the Gi00 interface remains in the routing table

39
Refer to the exhibit.How does router R1 handle traffic to 192.168.10.16?
A. It selects the EIGRP route because it has the lowest administrative distance
B. It selects the RIP route because it has the longest prefix inclusive of the destination address
C. It selects the OSFP route because it has the lowest cost
D. It selects the IS-IS route because it has the shortest prefix inclusive of the destination address

40

Which two actions influence the EIGRP route selection process? (Choose two)

A. The router calculates the reported distance by multiplying the delay on the exiting Interface by
256.
B. The router calculates the best backup path to the destination route and assigns it as the feasible
successor.
C. The router calculates the feasible distance of all paths to the destination route
D. The advertised distance is calculated by a downstream neighbor to inform the local router of
the bandwidth on the link
E. The router must use the advertised distance as the metric for any given route

41

Refer to the exhibit.which two commands were used to create port channel 10?(choose two)
A. int range g00-1
Channel-group 10 mode active
B. Bint range g00-1
Channel-group 10 mode desirable
C. int range g00-1
Channel-group 10 mode passive
D. int range g00-1
Channel-group 10 mode auto
E. int range g00-1
Channel-group 10 mode on

42
What is a difference between RADIUS and TACACS+?

A. TACACS+ encrypts only password information and RADIUS encrypts the entire payload
B. RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and
interim commands
C. RADIUS is most appropriate for dial authentication, but TACACS+ can be used for multiple types of
authentication
D. TACACS+ separates authentication and authorization, and RADIUS merges them

43
Refer to the exhibit. A network engineer must block access for all computers on VLAN 20 to the
web server via HTTP. All other
computers must be able to access the web server.Which configuration when applied to switch A
accomplishes this task?
A.

B.

C.

D.

44
Refer to the exhibit. How does the router manage traffic to 192.168.12.16?

A. It selects RIP route because it has the longest prefix inclusive of the destination address
B. It chooses the EIGRP route because it has the lowest administrative distance
C. It load-balances traffic between all three routes
D. It chooses the OSPF route because it has the longest prefix inclusive of the destination address

45

What is an advantage of Cisco DNA Center versus traditional campus device management?

A. It supports numerous extensibility options including cross-domain adapters and third-party


SDKs.
B. It supports high availability for management functions when operating in cluster mode.
C. It enables easy autodiscovery of network elements m a brownfield deployment.
D. It is designed primarily to provide network assurance

46

While examining excessive traffic on the network,it is noted that all incoming packets on an
interface appear to be allowed even though an IPv4 ACL is applied to the interface. Which two
misconfigurations cause this behavior? (Choose two)

A. The packets fail to match any permit statement


B. A matching permit statement is too high in the access test
C. A matching deny statement is too high in the access list
D. A matching permit statement is too broadly defined
E. The ACL is empty
D

47

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

A. disabling TPC so that access points can negotiate signal levels with their attached wireless
devices.
B. setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN Controller
C. allocating non overlapping channels to access points that are in close physical proximity to
one another
D. configuring access points to provide clients with a maximum of 5 Mbps

48

How do traditional campus device management and Cisco DNA Center device management differ in regards to
deployment?

A. Cisco DNA Center device management can be implemented at a lower cost than most traditional campus device
management options
B. Traditional campus device management schemes can typically deploy patches and updates more quickly than
Cisco DNA Center device management.
C. Cisco DNA Center device management can deploy a network more quickly than traditional campus device
management
D. Traditional campus device management allows a network to scale more quickly than with Cisco DNA Center
device management.

49

Which two actions are performed by the Weighted Random Early Detection mechanism?
(Choose two)

A. It drops lower-priority packets before it drops higher-priority packets


B. It can identify different flows with a high level of granularity
C. It guarantees the delivery of high-priority packets
D. It can mitigate congestion by preventing the queue from filling up
E. IT supports protocol discovery

50

Which set of action satisfy the requirement for multi-factor authentication?

A. The user swipes a key fob, then clicks through an email link
B. The user enters a user name and password, and then clicks a notification in an authentication
app on a mobile device
C. The user enters a PIN into an RSA token, and then enters the displayed RSA key on a login
scre
D. The user enters a user name and password and then re-enters the credentials on a second
screen

You might also like