Ccna Questions 2
Ccna Questions 2
Ccna Questions 2
NEW QUESTION 1
Which utility can you use to identify redundant or shadow rules ?
Answer: B
NEW QUESTION 2
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)
A. Session
B. transport
C. presentation
D. application
E. data-link
F. network
Answer: ACD
NEW QUESTION 3
Which command is used to show the interface status of a router?
Answer: B
NEW QUESTION 4
Which feature is configured by setting a variance that is at least two times the metric?
Answer: B
NEW QUESTION 5
Which IPV6 function serves the same purpose as ARP entry verification on an IPv4 network?
Answer: C
NEW QUESTION 6
Which type of MAC address is aged automatically by the switch?
A. automatic
B. manual
C. dynamic
D. static
Answer: C
NEW QUESTION 7
In which byte of an IP packet can traffic be marked ?
Answer: A
Explanation: Reference:
http://flylib.com/books/2/686/1/html/2/images/1587051990/graphics/13fig01.gif
NEW QUESTION 8
Which WAN topology is most appropriate for a centrally located server farm with several satellite branches?
A. star
B. hub and spoke
C. point-to-point
D. full mesh
Answer: B
Explanation:
In a Hub-and-spoke Site-to-Site Wide Area Network (WAN) network topology, one physical site act as Hub (Example, Main Office), while other physical sites act as
spokes. Spoke sites are connected to each other via Hub site. In Huband-spoke Wide Area Network (WAN) topology, the network communication between two
spokes always travels through the hub.
NEW QUESTION 9
Where does a switch maintain DHCP snooping information?
Answer: C
NEW QUESTION 10
Which VTP mode prevents you from making changes to VLANs?
A. server
B. off
C. client
D. transparent
Answer: C
NEW QUESTION 10
Which technology can provide security when connection multiple sites across the internet?
A. EBGP
B. DMVPN
C. Site-to-site vpn
D. MPLS
Answer: B
NEW QUESTION 12
which technology supports multiple dynamic secure connections an unsecure transport network ?
A. DMVPN
B. VPN
C. Site-to-site VPN
D. client VPN
Answer: A
NEW QUESTION 17
Which keyword enables an HSRP router to take the active role immediately when it comes online?
A. IP address
B. Priority
C. Preempt
D. Version
Answer: C
NEW QUESTION 22
Which port security mode can assist with troubleshooting by keeping count of violations?
A. access.
B. protect.
C. restrict.
D. shutdown.
Answer: C
NEW QUESTION 24
Which address class includes network 191.168.0.1/27?
A. Class C
B. Class B
C. Class D
D. Class A
Answer: B
NEW QUESTION 27
On which type of port can switches interconnect for multi-VLAN communication?
A. interface port
B. access port
C. switch port
D. trunk port
Answer: D
NEW QUESTION 29
Which two options are fields in an ethernet frame ? choose two
A. destination ip address
B. source ip address
C. type
D. frame check sequence
E. header
Answer: CD
NEW QUESTION 33
Which Two options are features of the extended ping command?
Answer: AE
NEW QUESTION 34
If you configure syslog messages without specifying the logging trap level, which log messages will the router send?
Answer: E
NEW QUESTION 35
Refer to Exhibit.
If Computer A is sending traffic to computer B, which option is the source ip address when a packet leaves R1 on interface F0/1?
Answer: C
NEW QUESTION 36
To enable router on a stick on a router subinterface, which two steps must you perform ? choose two
Answer: CD
NEW QUESTION 39
Which options are requirements for configuring RIPv2 on an IPv4 network router? (Choose two.)
Answer: AB
NEW QUESTION 44
Refer to the exhibit.
If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the packet ?
A. 192.168.14.4
B. 192.168.12.2
C. 192.168.13.3
D. 192.168.15.5
Answer: A
NEW QUESTION 47
What type of MAC address is aged automatically by the switch?
A. Dynamic
B. Manual
C. Automatic
D. Static
Answer: A
NEW QUESTION 48
Which option is the master redundancy scheme for stacked switches?
A. 1:N
B. 1:1
C. N:1
D. 1+N
Answer: A
NEW QUESTION 50
Refer to the exhibit.
After you apply the given configuration to R1, you notice that it failed to enable OSPF
Which action can you take to correct the problem?
Answer: C
NEW QUESTION 54
which two statements about data vlans on access ports are true ?
Answer: CE
NEW QUESTION 56
which three options are benefits of using TACACS+ on a device ?
A. Device administration packets are encrypted in their entirety
B. it allows the user to remotely access devices from other vendors
C. it supports access level authorization for commands
D. it ensures that user activity is untraceable
E. it allows users to be authenticated against a remote server
F. it provides a secure accounting facility on the device
Answer: ACE
NEW QUESTION 60
Which function does traffic shaping perform?
Answer: D
NEW QUESTION 62
Refer to exhibit.
Which command can you enter to verify link speed and duplex setting on the interface?
A. router#show ip protocols
B. router#show startup-config
C. router#show line
D. router#show interface gig 0/1
Answer: D
NEW QUESTION 66
which command can you enter to create a NAT Pool of 6 addresses ?
Answer: B
NEW QUESTION 67
which two statements about vtp are true ?
A. all switches must be configured with the same VTP domain name
B. all switches must be configured with a unique vtp domain name
C. all switches must be configured to perform trunk negotiation
D. all switches must use the same VTP Version
E. The VTP Server must have the highest revision number in the domain
Answer: AD
NEW QUESTION 71
Which major component of the network virtualization architecture isolates users according to policy?
Answer: A
NEW QUESTION 72
Which definition of default route is true?
Answer: C
NEW QUESTION 77
What is true about Cisco Discovery Protocol ?
Answer: D
NEW QUESTION 82
which option is the correct CIDR notation for 192.168.0.0 subnet 255.255.255.252?
A. /29
B. /30
C. /31
D. /32
Answer: B
NEW QUESTION 86
Which networking Technology is currently recognized as the standard for computer networking?
Answer: B
NEW QUESTION 90
When you deploy multilink PPP on your network, where must you configure the group IP Address on each device?
Answer: D
NEW QUESTION 95
Drag and drop each cable type from the left onto the type of connection for which it is best suited on the right .
Answer:
Explanation:
NEW QUESTION 97
Which HSRP feature was new in HSRPv2?
Answer: A
A. fc00::/7
B. fc00::/8
C. fe80::/10
Answer: C
Answer: A
Answer: C
A. Trunk Ports
B. Access Ports
C. Dynamic Auto
D. Dynamic Desirable
Answer: C
Explanation:
The 'dynamic auto' will configure the port to accept incoming negotiation and will accept becoming either a trunk or an access port. Dynamic Auto allows the port to
negotiate DTP (Dynamic Trunking Protocol) if the other side is set to trunk or desirable. Otherwise it will become an access port.
A. trunk
B. access
C. dynamic desirable
D. dynamic auto
Answer: C
A. The Cisco IOS device must be on the same lan as the TFTP server
B. The operation is performed in passive mode
C. The operation is performed in an unencrypted format
D. The operation is performed in active mode
Answer: A
A. IEEE 802.1x
B. RARP
C. CSMA/CA
D. CSMA/CD
Answer: D
A. Low cost
B. Full-mesh capability
C. Flexibillity of design
D. Simply configuration
Answer: D
Answer: A
Answer: B
A. Broadcast
B. multicast
C. unicast
D. anycast
Answer: B
Answer: D
A. Client
B. Server
C. peer
D. master
Answer: D
A. to speed up convergence
B. to reduce routing overhead
C. to lower costs by replacing routers with distribution layer switches
D. to decrease latency by increasing bandwidth
E. to confine network instability to single areas of the network
F. to reduce the complexity of router configuration
Answer: ABE
A. 2
B. 90
C. 110
D. 52778
Answer: D
Answer: E
Answer: A
Answer: B
A. 32
B. 48
C. 64
D. 128
Answer: C
Explanation: http://networkengineering.stackexchange.com/questions/30836/calculate-networking-bits-for-ipv6
64 bits for Network ID and 64 bits for Interface ID 64+64=128
Answer: A
A. preamble
B. time to live
C. version
D. header checksum
E. length type
F. frame check sequence
Answer: AEF
Answer: B
Answer: B
A. Dynamic Routing
B. DNS
C. Preempt
D. overload
Answer: D
Answer: AE
Answer:
Explanation:
Answer: B
Answer: E
A. static
B. RIPng
C. OSPFv3
D. IS-IS for IPv6
Answer: B
Answer: B
Answer: D
Explanation: One of the most important features of the APIC-EM controller is the capability to manage policies across the entire network. APIC-EM ACL Analysis
and Path Trace provide tools to allow the administrator to analyze and understand ACL policies and configurations. Administrators are hesitant to change ACLs,
for fear of breaking them and causing new problems. Together, ACL Analysis and Path Trace enable the administrator to easily visualize traffic flows and discover
any conflicting, duplicate, or shadowed ACL entries.
A. Frame Relay
B. HDLC
C. PPP
D. SDLC
Answer: B
A. late collisions
B. giants
C. interface resets
D. runts
Answer: A
A. Configure two VTP domains and configure the switches in transparent mode.
B. Enable spanning-tree load balancing.
C. Implement switch port security on designated ports.
D. Configure a separate VLAN for each department.
Answer: D
NEW QUESTION 211
Which functionality does an SVI provide?
Answer: C
Answer: C
Refer to the exhibit. Which command would you use to configure a static route on Router1 to network 192.168.202.0/24 with a nondefault administrative distance?
Answer: A
A. show ip protocol
B. show ip nat translation
C. show counters
D. show iproute
E. show ip nat statistics
Answer: B
Answer: AD
Answer:
A. Teredo
B. 6to4
C. 4to6
D. GRE
E. ISATAP
Answer: B
A. CLNS
B. TCPv6
C. NHRP
D. NDP
E. ARP
Answer: D
Answer: ADE
Answer: AB
A. 16384
B. 8192
C. 28672
D. 32768
Answer: B
Answer: BD
A. Switch(confg-if)#Switch port-security
B. Switch(confg-if)#Switch port-security Mac-address sticky
C. Switch(confg-if)#Switch port-security maximum 10
D. Switch(confg-if)#Switch mode access
Answer: B
A. 32
B. 48
C. 64
D. 128
Answer: C
A. FIB
B. ARP
C. TCAM
D. CAM
Answer: D
Answer: A
A. An ICMP connection must be established between the workstation and the web server.
B. A UDP connection must be established between the workstation and its default gateway.
C. A TCP connection must be established between the workstation and its default gateway.
D. A UDP connection must be established between the workstation and the web server.
E. An ICMP connection must be established between the workstation and its default gateway.
F. A TCP connection must be established between the workstation and the web server.
Answer: F
Answer: A
Refer to the exhibit. The network administrator is testing connectivity from the branch router to the newly installed application server. Which reason is the most
likely for the first ping having a success rate of only 60 percent?
Answer: B
NEW QUESTION 272
Which three statements are typical characteristics of VLAN arrangements? (Choose three.)
Answer: CDF
Answer: AE
Answer: B
Answer: B
A. NAT pool
B. dynamic NAT
C. static NAT
D. one-way NAT
Answer: A
Answer:
Explanation: 1- configure default route on router HQ : ipv6 unicast-routing ipv6 route ::/0 2001:DB8:B:B1B2::1
2- advertise this route under ospfv3
Ipv6 router ospf 100
Default-information originate
3- fix adjacency problem if a area mismatches We need to enter in s1/0
Ipv6 ospf 100 area 0
Answer: A
A. the tunnel ID
B. the prefix length
C. the interface number
D. the autonomous system
Answer: B
A. line mode
B. interface mode
C. global mode
D. router mode
Answer: C
Answer: C
Answer:
Explanation:
A. authorization
B. accountability
C. authority
D. authentication
E. accounting
F. accessibility
Answer: ADE
Explanation:
The exhibit is showing the topology and the MAC address table. Host A sends a data frame to host D. Which option describes what the switch will do when it
receives the frame from host A?
A. The switch will flood the frame out of all ports except for port Fa0/3.
B. The switch will add the destination address of the frame to the MAC address table and forward theframe to host D.
C. The switch will add the source address and port tothe MAC address table and forward the frame to host D.
D. The switch will discard the frame and send an error message back to host A.
Answer: C
A. Configure routes through the tunnel with a lower metric than other routes.
B. Configure route filtering to prevent the tunnel endpoints from learning each other through the tunnel.
C. Enable QoS on the link.
D. Configure routes through the tunnel with a higher metric than other routes.
E. configure GRE keepalives on the tunnel interface.
Answer: BD
A. clock offset
B. stratum
C. reference
D. dispersion
Answer: B
Answer: B
Explanation: http://www.omnisecu.com/cisco-certified-network-associate-ccna/etherchannel-pagp-and-lacp-modes.php
Answer: C
Answer:
Explanation: http://knutsonco.tripod.com/id9.html
A. The router maintains a user session indefinitely after it is active for 30 seconds.
B. The router disconnects the user session if it is inactive for 30 minutes.
C. The router maintains a user session indefinitely after it is active for 30 minutes.
D. The router disconnects a user session if it is inactive for 30 seconds.
Answer: B
A. AAA authentication
B. DHCP
C. dialer interface
D. virtual-template interface
Answer: D
A. The switch will not forward a frame with this destination MAC address.
B. The frame will be forwarded out of all the ports on the switch.
C. The MAC address of ffff.ffff.ffff will be added to the MAC address table.
D. The frame will be forwarded out of all the active switch ports except for port fa0/0.
E. The MAC address of 0000.00aa.aaaa will be added to the MAC Address Table.
F. The frame will be forwarded out of fa0/0 and fa0/1 only.
Answer: DE
Answer:
NEW QUESTION 326
Which statement about NTP is true?
Answer: B
Explanation: We should create an access-list and apply it to the interface that is connected to the Server LAN because it can filter out traffic from both S2 and
Core networks. To see which interface this is, use the “show ip int brief” command:
From this, we know that the servers are located on the fa0/1 interface, so we will place our numbered access list here in the outbound direction.
Corp1#configure terminal
Our access-list needs to allow host C – 192.168125.3 to the Finance Web Server 172.22.109.17 via HTTP (port 80), so our first line is this:
Corp1(config)#access-list 100 permit tcp host 192.168.125.3 host 172.22.109.17 eq 80
Then, our next two instructions are these:
Other types of access from host C to the Finance Web Server should be blocked.
All access from hosts in the Core or local LAN to the Finance Web Server should be blocked.
This can be accomplished with one command (which we need to do as our ACL needs to be no more than 3
lines long), blocking all other access to the finance web server:
Corp1(config)#access-list 100 deny ip any host 172.22.109.17
Our last instruction is to allow all hosts in the Core and on the local LAN access to the Public Web Server (172.22.109.18)
Corp1(config)#access-list 100 permit ip host 172.22.109.18 any Finally, apply this access-list to Fa0/1 interface (outbound direction) Corp1(config)#interface
fa0/1 Corp1(config-if)#ip access-group 100 out
Notice: We have to apply the access-list to Fa0/1 interface (not Fa0/0 interface) so that the access-list can filter traffic coming from both the LAN and the Core
networks.
To verify, just click on host C to open its web browser. In the address box type http://172.22.109.17
to check
if you are allowed to access Finance Web Server or not. If your configuration is correct then you can access it.
Click on other hosts (A, B and D) and check to make sure you can’t access Finance Web Server from these hosts. Then, repeat to make sure they can reach the
public server at 172.22.109.18. Finally, save the configuration
Corp1(config-if)#end
Corp1#copy running-config startup-config
A. a Layer 3 switch
B. a hub
C. a bridge
D. an access point
E. a router
Answer: AE
A. unlimited
B. 8
C. 2
D. 1
Answer: A
Answer: AB
Answer: AC
A. DHCP
B. DNS
C. OSPF
D. RIP
E. CDP
Answer: AE
Answer: B
Answer: D
Answer: A
NEW QUESTION 356
Drag and drop the descriptions of performing an initial device configuration from the left onto the correct features or compnents on the right.
Answer:
Explanation:
A. ntp peer
B. ntp max-associations
C. ntp authenticate
D. ntp trusted-key
E. ntp authentication-key
F. ntp refclock
Answer: CDE
Answer: C
A. forwarding
B. desirable
C. transparent
D. Auto
E. on
F. off
Answer: BDE
Answer: D
A. ICMP
B. STP
C. VTP
D. HSRP
Answer: A
A. 1111110
B. 1111111
C. 00000000
D. 1111100
Answer: A
A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.
Answer: AD
Explanation:
The transport layer segments data into smaller pieces for transport. Each segment is assigned a sequence number, so that the receiving device can reassemble
the data on arrival.
The transport layer also use flow control to maximize the transfer rate while minimizing the requirements to retransmit. For example, in TCP, basic flow control is
implemented by acknowledgment by the receiver of the receipt of data; the sender waits for this acknowledgment before sending the next part.
A. Branch2 LAN network 172.16.11.0/24 is not advertised into the EIGRP network.
B. Branch2 LAN network 172 16.10 0/24 is not advertised into the EIGRP network
C. R3 server farm2 network 10.20.30.0/24 is not advertised into the EIGRP network.
D. Branch1 LAN network 172.16.12.0/24 is not advertised into the EIGRP network
Answer: B
Answer: A
Answer: AE
A. 2
B. 90
C. 110
D. 52778
Answer: D
Answer: BCD
Click the console connected to RouterC and issue the appropriate commands to answer the questions.
What would be the effect of issuing the command ip access-group 115 in on the s0/0/1 interface?
Answer: A
A. Traffic that is destined to 10.10.10.0/24 from R1 LAN network uses static route instead RIPv2 Because the static route AD that is configured is less than the AD
of RIPv2
B. Traffic that is destined to 10.10.10.0/24 from R1 LAN network uses RIPv2 instead static route Because the static route AD that is configured is higher than the
AD of RIPv2
C. Traffic that is destined to 10.10.10.0/24 from R1 LAN network uses static route instead RIPv2 But the traffic is forwarded to the ISP instead of the internal
network.
D. Traffic that is destined to 10.10.10.0/24 from R1 LAN network uses RIPv2 instead static route Because the static route AD that is configured is 255
Answer: B
Explanation:
Configuration are below for the answer.
Answer: B
A. HDLC
B. PPP
C. X.25
D. Frame Relay
Answer: B
A. outside global
B. outside local
C. inside global
D. inside local
E. outside public
F. inside public
Answer: C
Answer:
Answer: BCF
Answer: B
Answer: D
Answer: BDE
Explanation: Microsegmentation is a network design (functionality) where each workstation or device on a network gets its own dedicated segment (collision
domain) to the switch. Each network device gets the full bandwidth of the segment and does not have to share the segment with other devices. Microsegmentation
reduces and can even eliminate collisions because each segment is its own collision domain ->.
Note: Microsegmentation decreases the number of collisions but it increases the number of collision domains.
Answer: AB
Answer: BCE
Answer: C
But when we look at the EIGRP configuration, the “network 192.168.16.0” command is missing on R6.
NEW QUESTION 432
Which option describes a benefit of a point-to-point leased line?
A. full-mesh capability
B. flexibility of design
C. low cost
D. simplicity of configuration
Answer: D
Answer:
Answer: A
On Branch1:
Answer:
A. A standard ACL statement that is configured on R1 is blocking the traffic sourced from Server1 network.
B. A standard ACL statement that is configured on R2 is blocking the traffic sourced from Setver1 network.
C. A standard ACL statement that is configured on R2 is blocking the traffic sourced from R2 LAN network.
D. A standard ACL statement that is configured on R1 is blocking the traffic sourced from R2 LAM network
Answer: B
Answer: BCF
Answer: A
A. speed
B. DTP negotiation settings
C. trunk encapsulation
D. duplex
Answer: B
A. redundancy
B. reduced jitter
C. increased latency
D. improved scalability
E. reliability
Answer: AE
Answer: BC
A. RIPv2 routing updates are suppressed between R2 and R3 using passive interface feature.
B. RIPv2 enabled on R3, but R3 LAN network that is not advertised into RIPv2 domain.
C. No issue that is identified; this behavior is normal since default route propagated into RIPv2 domain by Router R1.
D. RIPv2 not enabled on R3.
Answer: D
NEW QUESTION 471
Which two benefits can you get by stacking cisco switches ?(choose Two)
A. The stack enables any active member to take over as the master switch if the existing master fails.
B. Each switch in the stack can use a different ios image
C. You can add or remove switches without taking the stack down
D. you can license the entire stack with a single master license
E. each switch in the stack handles the mac table independently from the others
Answer: AC
Answer:
NEW QUESTION 475
Drag and drop the IEEE standard Cable names from the left onto the correct cable types on the right?
Answer:
Explanation:
A. it enables systems to learn about one another over the data-link layer
B. it uses mandatory TLVs to discover the neighboring devices
C. it is implemented in accordance with the 802.11a specification
D. if functions at layer 2 and layer 3
E. it is a cisco-proprietary technology
Answer: AC
Answer: A
A. Change the weight and distance settings on the other device to match
B. reset the gateway interface
C. reset the BGP connections on the device
D. Clear the IP routers on the device
Answer: C
Answer: B
Answer: C
NEW QUESTION 500
Which two statements about configuring an EtherChannel on a Cisco switch are true? (Choose two.)
A. The interfaces configured in the EtherChannel must be on the same physical switch.
B. The interfaces configured in the EtherChannel must operate at the same speed and duplex mode
C. An EtherChannel can operate in Layer 2 mode only.
D. The interfaces configured in the EtherChannel must be part of the same VLAN or trunk.
E. The interfaces configured in the EtherChannel must have the same STP port path cost
Answer: BD
Answer: CD
A. 0000.5E00.01A3
B. 0007.B400.AE01
C. 0000.0C07.AC15
D. 0007.5E00.B301
Answer: C
Explanation: With HSRP, two or more devices support a virtual router with a fictitious MAC address and unique IP address. There are two version of HSRP.
+ With HSRP version 1, the virtual router’s MAC address is 0000.0c07.ACxx , in which xx is the HSRP group.
+ With HSRP version 2, the virtual MAC address if 0000.0C9F.Fxxx, in which xxx is the HSRP group. Note: Another case is HSRP for IPv6, in which the MAC
address range from 0005.73A0.0000 through
0005.73A0.0FFF.
Answer: ACE
Answer: E
Answer: A
Given the output shown from this Cisco Catalyst 2950, what is the reason that interface FastEthernet 0/10 is not the root port for VLAN 2?
A. This switch has more than one interface connected to the root network segment in VLAN 2.
B. This switch is running RSTP while the elected designated switch is running 802.1d Spanning Tree.
C. This switch interface has a higher path cost to the root bridge than another in the topology.
D. This switch has a lower bridge ID for VLAN 2 than the elected designated switch.
Answer: C
A. IP SLA
B. SPAN
C. NetFlow
D. SNMP
E. RSPAN
Answer: CD
A. On R2. The network statement In the DHCP pool configuration is incorrectly configured.
B. On R3. DHCP is not enabled on the interface that is connected to R2.
C. On R2, the interface that is connected to R3 is in shutdown condition.
D. On R3, the interface that is connected to R2 is in shutdown condition.
Answer: B
NEW QUESTION 521
Which two states are the port states when RSTP has converged? (Choose two.)
A. discarding
B. listening
C. learning
D. forwarding
E. disabled
Answer: AD
Answer:
Answer: D
Explanation: Using the show running-config command we see that R6 has been incorrectly configured with the same router ID as R3 under the router OSPF
process.