0% found this document useful (0 votes)
38 views32 pages

CCNA Main Exam

Uploaded by

Anubhav Nayak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
38 views32 pages

CCNA Main Exam

Uploaded by

Anubhav Nayak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 32
CCNA Exam totapoints {AL Questions are Mandatory Email* ExtendedForms ld (skip this field) (DO NOT EDIT his eld your score wi et recoded 9204 1abS-2584-4990-b265-091 028780512 Name ‘Which statement about static and dynamic routes is true? * an © A dynamic rvtes are manually configured by a network administrator © B static routes are manually configured by @ network administrator © Listes eee router how fone packats retort ae dee connected, © 2.bimamicroues tet he router ow wo forward packets to networa hat ee det connected 2.Refer to the exhibit. f configuring a static default route on the router with 2/2 the ip route 0.0.0.00.0.0.0 10.13.0.1 120 command, how does the router respond? * (ore2 0.0.0.0/0 (120/1) via 10.12.0.15 00:00:01, Gigantertharnet0/0 Sovevévo/e\ta warsably sabnotied, 2 subnets, 2 mache 3010:0.0/24 de alsoctly conoested, clgabitainecnet0/9 ib.o.0.2/32 ds alsectiy sonected, Gigablemtharnat0/9 30.2u.0.0/20 te aivect\y comected, Clguniestnernet9/2 © A tenors the new stati roue uni the exis moved 19 OSPF defout route © 2 lines replaces the exsing OSPF route n te routing able wih the newly configured static route © Citstarts loadbalancing watfic between the wo default routes tt starts sending traffic without a apeciic matching entry inthe routing table to gig 00 3. When a floating static route is configured, which action ensures that the 2/2 bbackup route is used when the primary route falls? * @ A Teta state route must havea higher ariniatvedtnce than be Primary route s0 It is used asa backup © 2: the aaminitatve stance must be higher onthe primary out ao thatthe backup route becomes secondary © ©: Refating tat route must havea lone administrate dstrce than the primary route 0 ite used asa backup © 2.7 seteutitemation engines command mst be coriured forthe rote tobe installed inte the routing table 4,Router A learns the same route from two different neighbors, one of the 2/2 neighbor routers is an OSPFneighbor and the other is an EIGRP neighbor. What is the administrative distance of the route thatwill be installed in the routing table? * O° © 390 O° O° ‘5\What s the purpose of the show ip ospf interface command? * 22 © A aisplaying o5Pr-selated interface inform O 2 clpaying general information about OSPF routng processes © © displaying OSPF neighbor information on a perinterface basis © aisptaying OSPF neighbor information on a perinterfacetype basis 6. When OSPF learns multiple paths to a network, how does it select a route? "2/2 © A trmutiple the active K value by 256 to calculate the route with the lowest metric, © 8 foreach existng nerac, asthe metre fom the source outer tthe destination to caleulate route @ Steves a reference bandwith of 10 Mbos by he ata bandwith fhe existing interface to caleuat the router withthe lowest cot. © Bittcountthe number thon between he source router and the destination determine the router with the lowest metre 7. Which two minimum parameters must be configured on an active interface 2/2 to enable OSPFV2 to operate? (Choose two) A. OSPF area 7 8.0SPF MDS authentication key O c.Wve acaress OSPF process ID ‘8What isthe difference regarding reliability and communication type 2 between TCP and UDP? * {A TOP is reliable and isa connection-oriented protocol UDP is nat reliable and is @ connectionless protocol 8. TOP isnot reliable and isa connectionorented protocol, UDP is reliable andis @ connectionless protocol ©. TOP isnot reliable and sa connectionless protocol; UDP is reliable andi @ connection etentes protacol . TOP is reliable ang isa connectionlees protocol UDP isnot reliable and ie 2 conectionrarented protocol 000 6 9, How do TCP and UDP differ in the way that they estabish a connection 2/2 between two endpoints? * © A TeP uses synchronization packets, and UDP uses acknowledgment packets © 2 UDP ees SIN, SYN ACK ans FIN Bits inte frame header while TCP Uses SYA, SYN Ack and ACK bits © €upP provides reliable message transfer and TOP isa connectionless protocol © 0. TeP uses the three-way handshake and UDP does not guarantee message delivery 10. An engineer must add a subnet for a new office that will add 20 users to 2/2 the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses? * © A 1010.20548 285.255.255.240 8. 10.10.28 ° 95 255.255 240 © ©.10.10:2548 255.255.255.224 ® 0, 10.10.225.32 285.285.285.224 11, Youneed to route traffic to: 192.168.0.0/24 to 192.168.3.0/24 networks. what 0/2 willbe the summary route? * © Atsanes.roze © s.1s2.1680.0/26 © c rs2ne30022 © o.192188.1.0122 Correct answer © caszusaoon 12 Which statement about the nature of NAT overload is true? * 2 © A applies a oneto-many relationship to intemal IP addresses © B-appiies a oneto-one relationship te intemal IP addresses © © applies a maryrtomany relationship to internal P addresses O Brean be configured only on Gigabit interface 13. Which keyword in a NAT configuration enables the use of one outside IP 2/2 ‘address for multiple inside hosts? * O A source 8. state @oo ©. overload 14, Which IPvé address type provides communication between subnets and 0/2 cannot route on the internet? * © A stobat unica © 8B unieue toca © © tnkrocat © Pvmatticast Correct answer © Banique ocat 18. Which networking function occurs on the data plane? * © A tacattates spanningtvee elections O B processing inbound SSH management traffic rattle © © forwarding remate client/ser © B sending and receiving OSPF Hello packets 22 16. Which protocol does an access point use to draw power from a connected 0/2 switch? * © Aintemet coup Management Protocol © 2 .cisco discovery Protocol © C.Adaptive wireless Path Protocol © ONeichbor Discovery Protoeot Correct answer © B.ciseo discovery Protocol ‘7, Whatis the purpose for syslog? * 22 © A authentication © BAuthorzation © © Accounting 1B. Which command must be executed for Git/t on SW! to become trunk 0/2 port if Gif on SW2 is configured in desirable or trunk mode? * © Aswichport mode nk O Bewtenport made dottsunnel O C.swtenpertmade ynamie ato © P swtenpor mode namie desable Correct answer © P switenpor mode synamie desirable 19. What describes the operation of virtual machines? * 2 @ /Yitwal machines are response formanasng and locating host hardware 8, Vitualmachines are operating system instances tat are decoupled from server hardware © C virtual machines are the physical hardware that suppor virtual environment ©. navial machine environment, physical servers must run one operating sytem O anatime 20. Whatisa role of access points in an enterprise network? * an © A connect wireless devices toa wired network © B suppor secure user logins 1 devices ar the network © cimegrate wi SNMP in preventing DD0S attacks O Diserve as fist line of defense in an enterprise network 21. Three switches are participating in the VLAN spanning-tree process. 0/2, Branch-t priority 614440 Branch-2: priority 39082416 Branch-3: priority 0 Which switch becomes the permanent root bridge for VLAN 5? * O Apranct © 8 branch O Coranet3 Correct answer © cranch-a 22, Which technology allows for multiple operating systems tobe runona 2/2 single host computer? * © Avireal device contents 8. network port 1D visualization virtual rowing and forwarding . server virtualization @oo 23, An administrator must turn off the Cisco Discovery Protocol on the port 2/2 configured with last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement? * O rocdp enabe © clear edo able © reap run O nocdp advertise 24, Which two QoS tools provides congestion management? (Choose two) * 2/2 CO Arers Oscar cua CO Por = cBWFO, 28. An engineer needs to add an old switch back into a network. To prevent 0/2 the switch from corrupting the VLAN database which action must be taken? O Aaaeen © 5. Aad the switch in the VIP domain with a higher revision number switch in the VTP domain wth lower revision number © ©. Ade the switeh with OTP set to dynamic desirable © D-Aeid the eviteh with DTP sot to desirable Correct answer © Ahad the awiteh in the VTP domain wth a lower revision number 26. Which WLC port connects to a switch to pass normal access-point traffic? 2/2 © A aiateioution system O Bsenice O credendaney © Pconsete 27. Aside from discarding, which two states does the switch port transition 0/2 through while using RSTP (802.10)? (Choose two) * A fistening CO 8 blocking © forwarding © Dutearing C1 E speaking Correct answer ©. forwarding learning 28. What sa role of wireless controllers in an enterprise network? * on O Acserve ashe tet the of defense in an enterprise network © 2 support standalone or contote-based architectures © centralize the management of acess points n an enterprise network © © provide secure usr logins to devices onthe network Correct answer © © centatize the management of access points in an enterprise network 29, A network administrator must enable DHCP services between two sites. What must be configured fr the router to pass DHCPDISCOVER messages conto the server? * O Aaditce retey agent © Boner nding © © adver Poot © 0.04cP snooping Correct answer © A aDHCP Retay Agent on 30. An engineer must configure traffic for a VLAN that isuntagged by the 0/2 ‘switch as it crosses a trunklink. Which command should be used? © A switchport unk allowed vlan 10 © Beewtehport tank ive van 70 © © swtenport mode turk © Drewitehort trunk encapsulation dorig Correct answer © B.switchporttunk native van 10 31. How doos a switch process a frame received on Fo0! with the destination 2/2 MAC address of 0638.7363.457b when the table is missing the address? * © A reloods he frame wo all nteraces excep FAO © 8 it torwards the rame back out of interface Fao O 6: nekops he tame immediate, © Buttholds the fame unt the MAC addres timer expices and then drops the frame. 32, What isa benefit of HSRP? * 2 A. It provides traffic load balancing to destinations that are more than two hops trom © Bi ttprovides the detaut gateway redundancy on a LAN using two or mare routers © E Raliows neighbors to share routing table information between each other. © Dulteteents ops ns Layer 2LAN by forardng al atic rot bigs which then makes the final forwarding decision 33, Thentp server 192168.0.3 command has been configured on Router to 2/2 ‘make it an NTP client of router 2. Which command must be configured on Router? so that it operates in server-only mode and relies only on ts internal lock? * © Arouer2fontghntp passive © 2 Router2(eonighntp master © ©: Routera(contig)sntp server 172.97.0.1 O b.Routera(confighintp server 192.168.0.2 34, Which command on a port enters the forwarding state immediately when 0/2 aPC is connected toit? * © A suiteh(contig)tspanningtree porttast default O Bomiteh(contig)tspanning-ree portfast bpduguard defaut © © owhch(contigisspanning-ree portast O A rswiteh(contg:ifine spanning-vee portfas Correct answer © A switenicontio)aspanning-ee potas defaut 35, What s the purpose of a southbound API in a control based networking 2/2 architecture? * © A tacities eommuniceton between the cantrllr and the applications O B integrates a controller wth other automation and orchestration tools © C allows application developers to interact with the network © 2 tacitves communication between the conteller and the networking hardware 36, What are two descriptions of three-tier network topologies? (Choose o/2 two)" A The core and datioution ayers perform the same functions in ciferent domains (0 2 the acces: manages routing between dev C. The network core is designed 1 maintain continuous connectivity when devices fail , The cote layer maintalne wited connections for each host (0) E The ltrisuton layer suns Layer 2 and Layer 3 technologies Correct answer The network core is designed to maintaln continuous connectivity when devices fail , The distribution layer runs Layer 2 and Layer 3 technologies 37, An organization has decided to start using cloud-provided services. Which 2/2 cloud service allows the organization to install its own operating system on a Virtual machine? * O Aplattormase-serice O Bi sotmare-as-a-service O Cc networkasa-cervice © dintrastructureas--service 38, Which two statements about EtherChannel technology are true? (Choose 0/2 two)" | EtherChannel provides increased bandwith by bundling existing FastEthernet or Gigabit Ethemet interfaces into a single EtherChanne! 8. STP doesnot black EtherChannl inks Cy © Youcan confi utp eran inks between wo sith, ang pt limit of sinteen physical ports ©. EtherChannel doesnot allow load sharing of traffic among the physical inks within O the etherchannel (0) Eetherchannel allows redunceney in ease one or mare links inthe EtherChannel ail Correct answer [A therChannel provides inceased bandwidth by buncling existing FastEthernet or ‘Gigabit Etheret interfaces into a single EtherChannel .EtherChannel allows redundancy Incase one or more inks nthe EtherChannel fall 39. Which command must you enter to guarantee that an HSRP router with 2/2 higher priority becornes the HSRP primary router after tis reloaded? * © A-standty 10 version @s © C-standty 10 version 2 by 10 priory 150, 40, An administrator configures the following ACL in order to prevent devices 2/2 Con the 192.168.1.0 subnet of Router A from accessing the server at 10.115 ‘access-list 100 deny ip 192,168.10 0.0.0.255 host 10:11.5 access-list 100 ppermit ip any any Where should the administrator place this ACL for the most efficient use of network resources? * © A inbound on router A Fa0/0 O Breurbound on router B Fa0/0 © © outbound on router AFa0/1 © P inbound on router F200" 41, Anetwork administrator must permit SSH access to remotely manage 2/2, routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task? * O accesstist 20 permit udp 10:20:1.000.0:255 © Brno access ist 20 deny ep any 10.20.1.00.0..127 e922 © © acces O Dine access tit 2699 de Ist 120 permittep ary 10.20.1.00.0.0.256 e422 Ip any 1020.1.000.0255 42, Which effect does the aga new-model configuration command have? * 2/2 © A teenntigues the device to connect to a RADIUS server for AAA © Bittcontigues alocaluser on the devie O © trassoclates to RADIUS server te an AAA grou, © dittenabies AAA services on the devi, 43. What is the primary difference between AAA authentication and 22 authorization? * © Authentication verifies a usemame ard password and authorzation handles he ‘communication between the authentication agent and the user database © 2. Autenteation deities a use who tempting to acces a aystem ans authorization valdates the users password @ “futon dentin and veins a user whois atemptng to secess a tem, and authorization controls the tasks the user ean perform © D-Authenteaton conta the system processes a user can acess and autoratlon logs 9 activities the user initiates 44, Which configuration is needed to generate an RSAkey forSSHona 2/2 router? © A configure the version of SH © 2 configure vrv access O ccreatea user wit password © 2.Assign a ONS domain name 45, When a site-to-site VPN is used, which protocolis responsible forthe 2/2 transport of user data? * O Awe O een © cae © o.mos 46, Which command prevents passwords from being stored in the on configuration as plaintext on a router or switch? * © Acenable secret © B.sewice passwordeneryption Oo O Prenable password semame Cisco password encrypt Correct answer © B sence passwordeneryption 47. Which type of attack can be mitigated by dynamic ARP inspection? 2/2 O Armatware © 8.0008 © worm © 0 maniethemidate 48, Which IPvé adress type provides communication between subnets and 0/2 cannot route on the Internet? * O A slobat unicast © unique loca © © tnkioca © o-muticast Correct answer © P unique oes 49, What's the expected outcome when an EU-64 address is generated? * 0/2 © A The seventh bit ofthe original MAC address of the inter O 8 The itera The characters O inate © 0. The mac adéress ofthe interface is used asthe interface ID without modification Dis configured as a random 64-bit value re Inserted a the beginning ofthe MAC address ofthe Correct answer © A The sevent st ofthe original MAC adress ofthe interfaces inverted 50. Which command must be present in a Cisco Device configurationto 2/2 tenable the device to resolve an FQDN? * O Aiphost O Biipnameserver © © pdomainsookup O Dilp domate-name ‘Submission Tracking ID - DO NOT CHANGE * ‘hist impotant for tracking purposes. Oo nat change Any charge in ths wll make your submission void 3 "Wis comers ether ated or endorsed by Goole ~Tamat Seve Say Eley Google For

You might also like