Cisco CCNA

Please type your email address (for verification):
Please type your phone number using the international format (use your country code)
Which forwarding technology stores destination addresses in the cache?
MPLS
Cisco express forwarding
Process switching
Fast switching
Which type of network topology requires each network node to be connected to every other node?
Ring
Star
Mesh
Bus
A router receives identical prefixes from OSPF, EIGRP, RIP and the same route is configured statically. Which route does the router use to forward traffic?
Static route
RIP route
EIGRP route
OSPF route
Which syslog severity level logs informational messages?
2
6
4
0
Which option describes a standard role that a firewall plays in an enterprise network?
It can permit unauthorized packets to pass to less secure segments of the network
It can decide which packets can traverse from one segment of the network to another
It can forward packets based on rules that are predetermined by IEEE standards
It can deny all packets from entering an administrative domain.
Assume all the routing protocol have the same length prefix, what would the router prefer?
OSPF
EIGRP
CONNECTED
BGP
In which circumstances is static routing most useful?
On a stub network
On a large network that must share routes quickly between routers
On a network that experiences frequent link failures
On a network with frequent routing changes
Which statement describes the dynamic route correctly?
More secure than static
High scaling for large network
Can not be used in multi vendor environment
Built for small network
Which statement about standard access list is true?
They have an implicit permit statement at the end to allow all traffic
They can use either a wildcard mask or a subnet mask to identify host
They can be identified by a number from 1 to 99
They must be placed close to the source of traffic
Which of the following is used first to establish telnet session by having the host name?
DNS lookup
Ping
Syslog
ARP
Which two statements about Ethernet standards are true? (Choose two)
Ethernet is defined by IEEE standard 802.2
Ethernet is defined by IEEE standard 802.3
Ethernet 10BASE-T does not support full-duplex.
When an Ethernet network uses CSMA/CD, it terminates transmission as soon as a collision occurs.
When an Ethernet network uses CSMA/CA. It terminates transmission as soon as a collision occurs
What is the Cisco recommended DSCP value for voice traffic?
101110
100110
101111
111110
Which component of the Cisco SDN solution serves as the centralized management system ?
Cisco OpenDaylight
Cisco ACI
Cisco APIC
Cisco IWAN
Which Cisco platform can verify ACLs?
Cisco Prime Infrastructure
Cisco Wireless LAN Controller
Cisco APIC-EM
Cisco IOS-XE
Which command enables IPv6 forwarding on a Cisco router?
Ipv6 local
Ipv6 host
Ipv6 unicast-routing
Ipv6 neighbor
Which three approaches can be used while migrating from an IPv4 addressing scheme to an IPv6 scheme? (Choose three)
Enable dual-stack routing
Configure IPv6 directly
Configure IPv4 tunnels between IPv6 islands
Use proxying and translation to translate IPv6 packets into IPv4 packets
statically map IPv4 addresses to IPv6 addresses
Use DHCPv6 to map IPv4 addresses to IPv6 addresses
While you were troubleshooting a connection issue, a ping from one VLAN to another VLAN on the same switch failed. Which command verifies that IP routing is enabled on interfaces and the local VLANs are up?
Show ip interface brief
Show ip nat statistics
Show ip statistics
Show ip route
Which two pieces of information are provided by the “show controllers serial 0” command? (Choose two)
The type of cable that is connected to the interface
The uptime of the interface
The status of the physical layer of the interface
The full configuration of the interface
The interface‟s duplex settings
A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?
Router# show ip eigrp topology
Router# show ip eigrp interfaces
Router# show ip eigrp adjacency
Router# show ip eigrp neighbors
Which purpose of the network command in OSPF configuration mode is true?
It defines a wildcard mask to identify the size of the network
It defines the area ID
It defines the network by its classful entry
It defines which networks are used for virtual links
Which is the minimum privilege level to allow a user to execute all user-level commands but prohibits enable-level commands by default?
Level 1
Level 0
Level 16
Level 15
Level 14
What command can you enter to configure an enable password that uses an encrypted password from another configuration?
Enable secret $abc%!e.Cd34$!ao0
Enable secret 7 Sabc%!e.Cd34$!ao0
enable secret 0 Sabc%U*.Cd34$!ao0
Enable secret 5 $abc%!e.Cd34$!ao0
Enable secret 15 $abc%ie.Cd34$!ao0
Enable secret 6 $abc%!e.Cd34$!ao
Which password takes precedence if you configure multiple passwords for Telnet connections to a Cisco IOS device?
Console line password
Enable secret password
Enable password
Aux line password
Which condition must be met before you can configure SSH on a device running Cisco IOS?
The device must have an auxilary port
The device must have a modem connection
The IOS must be a crypto in
Telnet must be disabled on the device
Which two statements about the enable secret and enable password commands are true?(Choose two)
If both commands are missing from the global configuration, vty lines use the console password
The enable secret command overrides enable password
The enable password command has a stronger encryption algorithm than enable secret
The enable secret command is backwards-compatible with more versions of IOS
The enable secret and enable password commands must be used together
Which two statements about IP access-lists are true? (Choose two)
IP access-lists without at least one deny statement permit all traffic by default
Extended access-lists must include port numbers
They support wildcard masks to limit the address bits to which entries are applies.
Entries are applied to traffic in the order in which they appear
They end with an implicit permit
Which two different configuration can you apply to a device to block incoming SSH access? (Choose two)
Ipv6 access-list VTY-ACCESS-IN sequence 10 deny tcp any any eq 22 sequence 20 permit ipv6 any any line vty 0 15 ipv6 access-list VTY-ACCESS-IN out
ipv6 access-list VTY-ACCESS-IN sequence 10 deny tcp any any eq 22 sequence 20 permit ipv6 any any line vty 0 15 ipv6 access-class VTY-ACCESS-IN out
Ipv6 access-list VTY-ACCESS-IN sequence 10 deny tcp any any eq 22 sequence 20 permit ipv6 any any line vty 0 15 ipv6 access-class VTY-ACCESS-IN in
Ipv6 access-list VTY-ACCESS-IN sequence 10 deny tcp any any eq 22 sequence 20 permit ipv6 any any interface Ethernet0/0 ipv6 traffic-filter VTY-ACCESS-IN in
ipv6 access-list VTY-ACCESS-IN sequence 10 deny tcp any any eq 22 sequence 20 permit ipv6 any any interface Ethernet0/0 ipv6 traffic-filter VTY-ACCESS-IN out
Which PPP authentication method sends authentication information in cleartext?
MS CHAP
CDPCP
CHAP
PAP
Which two features were added in MSCHAP Version 2? (Choose two)
Backwards-compatibility with MSCHAP version 1
Using the MD5 hash for stronger security
Ability to change an expired password
Using three-way handshakes for authentication
Mutual authentication between peers
Which feature can automatically assign IP addresses in a PPPoE environment?
DHCP
BOOTP
PPP
APPA
Which Cisco Express Forwarding table or tables hold forwarding information?
FIB table only
Adjacency tables only
FIB and adjacency tables only
FIB,RIB, and adjacency tables
Which three algorithms can you configure with the ip cef load-sharing algorithm command?
Per-packed
Tunnel
Per-destination
Universal
Per-source
Include-ports
If you convert a WAN connection with OSPF from T1 to a Frame Relay circuit, which two actions must you take to enable the connection? (Choose two)
Change the OSPF network type to nonbroadcast
Manually configure neighbors in the OSPF process.
Manually configure the hello and dead timers
Change the OSPF network type to broadcast
Change the OSPF network type to multipoint nonbroadcast
Which two statements about Frame Relay LMI autosense are true on a router? (Choose two)
It requires the LMI type to be explicitly configured
It operates on Frame Relay DTE interfaces
It operates on Frame Relay DCE interfaces
It operates when the line is up but the line protocol is down
It requires the line protocol to be up
In which two ways can split horizon issues be overcome in a Frame Relay network environment? (choose two)
Configuring one physical serial interface with Frame Relay to various remote sites
Configure a loopback interface with Frame Relay to various remote sites
Configuring multiple subinterfaces on a single physical interface to various remote sites.
Enabling split horizon
Disabling split horizon
Which two services define cloud networks? (Choose two.)
Infrastructure as a Service
Platform as a service
Security as a service
Compute as a Service
Tenancy as a service
In which two situations should you use out-of-band management? (Choose two.)
When a network device fails to forward packets
When you require ROMMON access
When management applications need concurrent access to the device
when you require administrator access from multiple locations
When the control plane fails to respond
In which three ways does the TACACS protocol differ from RADIUS? (Choose three.)
TACACS uses TCP to communicate with the NAS
TACACS can encrypt the entire packet that is sent to the NAS.
TACACS supports per-command authorization.
TACACS authenticates and authorizes simultaneously, causing fewer packets to be transmitted.
TACACS uses UDP to communicate with the NAS
TACACS encrypts only the password field in an authentication packet
According to Cisco best practices, which three protocols should the default ACL allow on an access port to enable wired BYOD devices to supply valid credentials and connect to the network? (Choose three.)
BOOTP
TFTP
DNS
MAB
HTTP
802.1x
Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)
AES
3DES
DES
MD5
DH-1024
SHA-384
Which three ESP fields can be encrypted during transmission? (Choose three.)
Security Parameter Index
Sequence Number
MAC Address
Padding
Pad Lenght
Next Header
What are two default Cisco IOS privilege levels? (Choose two.)
0
1
5
7
10
15
Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)
Qos
traffic classification
Access lists
Policy maps
Class
Cisco Express Forwarding
Which two statements about stateless firewalls are true? (Choose two.)
They compare the 5-tuple of each incoming packet against configurable rules.
They cannot track connections.
They are designed to work most efficiently with stateless protocols such as HTTP or HTTPS
Cisco IOS cannot implement them because the platform is stateful by nature.
The Cisco ASA is implicitly stateless because it blocks all traffic by default.
What three actions are limitations when running IPS in promiscuous mode? (Choose three.)
Deny attacker
Deny packet
modify packet
request block connection
Request block host
Reset TCP connection
Which statement about the MAC address sticky entries in the switch when the copy run start command is entered is true?
A sticky MAC address is retained when the switch reboots.
A sticky MAC address can be a unicast or multicast address.
A sticky MAC address is lost when the switch reboots.
A sticky MAC address is lost when the switch reboots.
Enablement of which feature puts the port into err-disabled state when the port has PortFast enabled and it receives BPDUs?
BPDU filtering
BackboneFast
EtherChannel
BPDU guard
Refer to the exhibit. Which configuration ensures that the Cisco Discovery Protocol packet update frequency sent from DSW1 to ALS1 is half of the default value?
DSW1(config)#cdp timer 90
DSW1(config-if)#cdp holdtime 60
DSW1(config)#cdp timer 30
DSW1(config)#cdp holdtime 90
DSW1(config-if)#cdp holdtime 30
DSW1(config-if)#cdp holdtime 30
Interfaces are assigned to a VLAN, and then the VLAN is deleted. Which state are these interfaces in after the VLAN is deleted?
They remain up, but they are reassigned to the default VLAN
They go down until they are reassigned to a VLAN.
They go down, but they are reassigned to the default VLAN.
They remain up, but they are reassigned to the native VLAN.
Which feature is automatically configured when an administrator enables a voice VLAN?
802.1Q trunking
PortFast
QoS
Private VLANs
Which statement describes one major issue that VTP can cause in an enterprise network when a new switch is introduced in the network in VTP mode server?
It can cause network access ports to go into err-disabled state.
It can cause a network-wide VLAN configuration change if the revision number on the new switch is higher.
It can cause a network-wide VLAN configuration change if the revision number on the new switch is lower
It can cause routing loops
Which technique allows specific VLANs to be used over a trunk link?
VTP
Switchport mode trunk
Trunk-allowed VLANs
Switchport trunk native vlan
L2P tunneling
For security reasons, the IT manager has prohibited users from dynamically establishing trunks with their associated upstream switch. Which two actions can prevent interface trunking? (Choose two.)
Configure trunk and access interfaces manually
Disable DTP on a per interface basis.
Apply BPDU guard and BPDU filter
Enable switchport block on access ports
Which statement about HSRP, GLBP, and VRRP is true?
VRRP group members communicate using multicast address 224.0.0.102.
MAC address 0000.0c07.acOc indicates that default gateway redundancy is provided through GLBP
HSRP group members communicate using multicast address 224.0.0.18.
GLBP uses UDP port 3222 (source and destination) for hello messages.
Which two protocols can be automatically negotiated between switches for trunking? (Choose two)
PPP
DTP
ISL
HDLC
DLCI
DOT1Q
Which two options are two results of using the command spanning-tree vlan 50 root primary within a spanning-tree network under global configuration? (Choose two.)
Spanning tree determines the priority of the current root for VLAN 50 and reduces the priority of the local switch to a lower value.
The priority value for VLAN 50 is set to 4094 on the root while the local switch priority is set to 32768
The spanning-tree timers are reduced to improve the convergence time for VLAN 50
All ports that are configured on the current switch with VLAN 50 transition to designated ports.
The switchport that is configured for VLAN 50 is the primary connection to the spanning-tree root switch.
An access switch at a remote location is connected to the spanning-tree root with redundant uplinks. A network engineer notices that there are issues with the physical cabling of the current root port. The engineer decides to force the secondary link to be the desired forwarding root port. Which action accomplishes this task?
Change the link-type to point-to-point
Enable Rapid Spanning Tree to converge using the secondary link.
Adjust the secondary link to have a lower priority than the primary link.
Apply a BPDU filter on the primary interface of the remote switches.
Which protocol will enable a group of routers to form a single virtual router and will use the real IP address of a router as the gateway address?
Proxy ARP
HSRP
IRDP
VRRP
GLBP
Which two statements are true about recommended practices that are to be used in a local VLAN solution design where layer 2 traffic is to be kept to a minimum? (Choose two.)
Routing should occur at the access layer if voice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
Routing may be performed at all layers but is most commonly done at the core and distribution layers
Routing should not be performed between VLANs located on separate switches
VLANs should be local to a switch
VLANs should be localized to a single switch unless voice VLANs are being utilized.
In the hardware address 0000.0c07.ac0a, what does 07.ac represent?
HSRP well-known physical MAC address
Vendor code
HSRP router number
HSRP group number
HSRP well-known virtual MAC address
{"name":"Cisco CCNA", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Please type your email address (for verification):, Please type your phone number using the international format (use your country code), Which forwarding technology stores destination addresses in the cache?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.