Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
38 views
32 pages
CCNA Main Exam
Uploaded by
Anubhav Nayak
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save CCNA main Exam For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
38 views
32 pages
CCNA Main Exam
Uploaded by
Anubhav Nayak
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save CCNA main Exam For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save CCNA main Exam For Later
You are on page 1
/ 32
Search
Fullscreen
CCNA Exam totapoints {AL Questions are Mandatory Email* ExtendedForms ld (skip this field) (DO NOT EDIT his eld your score wi et recoded 9204 1abS-2584-4990-b265-091 028780512 Name‘Which statement about static and dynamic routes is true? * an © A dynamic rvtes are manually configured by a network administrator © B static routes are manually configured by @ network administrator © Listes eee router how fone packats retort ae dee connected, © 2.bimamicroues tet he router ow wo forward packets to networa hat ee det connected2.Refer to the exhibit. f configuring a static default route on the router with 2/2 the ip route 0.0.0.00.0.0.0 10.13.0.1 120 command, how does the router respond? * (ore2 0.0.0.0/0 (120/1) via 10.12.0.15 00:00:01, Gigantertharnet0/0 Sovevévo/e\ta warsably sabnotied, 2 subnets, 2 mache 3010:0.0/24 de alsoctly conoested, clgabitainecnet0/9 ib.o.0.2/32 ds alsectiy sonected, Gigablemtharnat0/9 30.2u.0.0/20 te aivect\y comected, Clguniestnernet9/2 © A tenors the new stati roue uni the exis moved 19 OSPF defout route © 2 lines replaces the exsing OSPF route n te routing able wih the newly configured static route © Citstarts loadbalancing watfic between the wo default routes tt starts sending traffic without a apeciic matching entry inthe routing table to gig 003. When a floating static route is configured, which action ensures that the 2/2 bbackup route is used when the primary route falls? * @ A Teta state route must havea higher ariniatvedtnce than be Primary route s0 It is used asa backup © 2: the aaminitatve stance must be higher onthe primary out ao thatthe backup route becomes secondary © ©: Refating tat route must havea lone administrate dstrce than the primary route 0 ite used asa backup © 2.7 seteutitemation engines command mst be coriured forthe rote tobe installed inte the routing table4,Router A learns the same route from two different neighbors, one of the 2/2 neighbor routers is an OSPFneighbor and the other is an EIGRP neighbor. What is the administrative distance of the route thatwill be installed in the routing table? * O° © 390 O° O° ‘5\What s the purpose of the show ip ospf interface command? * 22 © A aisplaying o5Pr-selated interface inform O 2 clpaying general information about OSPF routng processes © © displaying OSPF neighbor information on a perinterface basis © aisptaying OSPF neighbor information on a perinterfacetype basis6. When OSPF learns multiple paths to a network, how does it select a route? "2/2 © A trmutiple the active K value by 256 to calculate the route with the lowest metric, © 8 foreach existng nerac, asthe metre fom the source outer tthe destination to caleulate route @ Steves a reference bandwith of 10 Mbos by he ata bandwith fhe existing interface to caleuat the router withthe lowest cot. © Bittcountthe number thon between he source router and the destination determine the router with the lowest metre 7. Which two minimum parameters must be configured on an active interface 2/2 to enable OSPFV2 to operate? (Choose two) A. OSPF area 7 8.0SPF MDS authentication key O c.Wve acaress OSPF process ID‘8What isthe difference regarding reliability and communication type 2 between TCP and UDP? * {A TOP is reliable and isa connection-oriented protocol UDP is nat reliable and is @ connectionless protocol 8. TOP isnot reliable and isa connectionorented protocol, UDP is reliable andis @ connectionless protocol ©. TOP isnot reliable and sa connectionless protocol; UDP is reliable andi @ connection etentes protacol . TOP is reliable ang isa connectionlees protocol UDP isnot reliable and ie 2 conectionrarented protocol 000 6 9, How do TCP and UDP differ in the way that they estabish a connection 2/2 between two endpoints? * © A TeP uses synchronization packets, and UDP uses acknowledgment packets © 2 UDP ees SIN, SYN ACK ans FIN Bits inte frame header while TCP Uses SYA, SYN Ack and ACK bits © €upP provides reliable message transfer and TOP isa connectionless protocol © 0. TeP uses the three-way handshake and UDP does not guarantee message delivery10. An engineer must add a subnet for a new office that will add 20 users to 2/2 the network. Which IPv4 network and subnet mask combination does the engineer assign to minimize wasting addresses? * © A 1010.20548 285.255.255.240 8. 10.10.28 ° 95 255.255 240 © ©.10.10:2548 255.255.255.224 ® 0, 10.10.225.32 285.285.285.224 11, Youneed to route traffic to: 192.168.0.0/24 to 192.168.3.0/24 networks. what 0/2 willbe the summary route? * © Atsanes.roze © s.1s2.1680.0/26 © c rs2ne30022 © o.192188.1.0122 Correct answer © caszusaoon12 Which statement about the nature of NAT overload is true? * 2 © A applies a oneto-many relationship to intemal IP addresses © B-appiies a oneto-one relationship te intemal IP addresses © © applies a maryrtomany relationship to internal P addresses O Brean be configured only on Gigabit interface 13. Which keyword in a NAT configuration enables the use of one outside IP 2/2 ‘address for multiple inside hosts? * O A source 8. state @oo ©. overload14, Which IPvé address type provides communication between subnets and 0/2 cannot route on the internet? * © A stobat unica © 8B unieue toca © © tnkrocat © Pvmatticast Correct answer © Banique ocat 18. Which networking function occurs on the data plane? * © A tacattates spanningtvee elections O B processing inbound SSH management traffic rattle © © forwarding remate client/ser © B sending and receiving OSPF Hello packets 2216. Which protocol does an access point use to draw power from a connected 0/2 switch? * © Aintemet coup Management Protocol © 2 .cisco discovery Protocol © C.Adaptive wireless Path Protocol © ONeichbor Discovery Protoeot Correct answer © B.ciseo discovery Protocol ‘7, Whatis the purpose for syslog? * 22 © A authentication © BAuthorzation © © Accounting1B. Which command must be executed for Git/t on SW! to become trunk 0/2 port if Gif on SW2 is configured in desirable or trunk mode? * © Aswichport mode nk O Bewtenport made dottsunnel O C.swtenpertmade ynamie ato © P swtenpor mode namie desable Correct answer © P switenpor mode synamie desirable19. What describes the operation of virtual machines? * 2 @ /Yitwal machines are response formanasng and locating host hardware 8, Vitualmachines are operating system instances tat are decoupled from server hardware © C virtual machines are the physical hardware that suppor virtual environment ©. navial machine environment, physical servers must run one operating sytem O anatime 20. Whatisa role of access points in an enterprise network? * an © A connect wireless devices toa wired network © B suppor secure user logins 1 devices ar the network © cimegrate wi SNMP in preventing DD0S attacks O Diserve as fist line of defense in an enterprise network21. Three switches are participating in the VLAN spanning-tree process. 0/2, Branch-t priority 614440 Branch-2: priority 39082416 Branch-3: priority 0 Which switch becomes the permanent root bridge for VLAN 5? * O Apranct © 8 branch O Coranet3 Correct answer © cranch-a 22, Which technology allows for multiple operating systems tobe runona 2/2 single host computer? * © Avireal device contents 8. network port 1D visualization virtual rowing and forwarding . server virtualization @oo23, An administrator must turn off the Cisco Discovery Protocol on the port 2/2 configured with last usable address in the 10.0.0.0/30 subnet. Which command set meets the requirement? * O rocdp enabe © clear edo able © reap run O nocdp advertise 24, Which two QoS tools provides congestion management? (Choose two) * 2/2 CO Arers Oscar cua CO Por = cBWFO,28. An engineer needs to add an old switch back into a network. To prevent 0/2 the switch from corrupting the VLAN database which action must be taken? O Aaaeen © 5. Aad the switch in the VIP domain with a higher revision number switch in the VTP domain wth lower revision number © ©. Ade the switeh with OTP set to dynamic desirable © D-Aeid the eviteh with DTP sot to desirable Correct answer © Ahad the awiteh in the VTP domain wth a lower revision number 26. Which WLC port connects to a switch to pass normal access-point traffic? 2/2 © A aiateioution system O Bsenice O credendaney © Pconsete27. Aside from discarding, which two states does the switch port transition 0/2 through while using RSTP (802.10)? (Choose two) * A fistening CO 8 blocking © forwarding © Dutearing C1 E speaking Correct answer ©. forwarding learning28. What sa role of wireless controllers in an enterprise network? * on O Acserve ashe tet the of defense in an enterprise network © 2 support standalone or contote-based architectures © centralize the management of acess points n an enterprise network © © provide secure usr logins to devices onthe network Correct answer © © centatize the management of access points in an enterprise network29, A network administrator must enable DHCP services between two sites. What must be configured fr the router to pass DHCPDISCOVER messages conto the server? * O Aaditce retey agent © Boner nding © © adver Poot © 0.04cP snooping Correct answer © A aDHCP Retay Agent on30. An engineer must configure traffic for a VLAN that isuntagged by the 0/2 ‘switch as it crosses a trunklink. Which command should be used? © A switchport unk allowed vlan 10 © Beewtehport tank ive van 70 © © swtenport mode turk © Drewitehort trunk encapsulation dorig Correct answer © B.switchporttunk native van 10 31. How doos a switch process a frame received on Fo0! with the destination 2/2 MAC address of 0638.7363.457b when the table is missing the address? * © A reloods he frame wo all nteraces excep FAO © 8 it torwards the rame back out of interface Fao O 6: nekops he tame immediate, © Buttholds the fame unt the MAC addres timer expices and then drops the frame.32, What isa benefit of HSRP? * 2 A. It provides traffic load balancing to destinations that are more than two hops trom © Bi ttprovides the detaut gateway redundancy on a LAN using two or mare routers © E Raliows neighbors to share routing table information between each other. © Dulteteents ops ns Layer 2LAN by forardng al atic rot bigs which then makes the final forwarding decision 33, Thentp server 192168.0.3 command has been configured on Router to 2/2 ‘make it an NTP client of router 2. Which command must be configured on Router? so that it operates in server-only mode and relies only on ts internal lock? * © Arouer2fontghntp passive © 2 Router2(eonighntp master © ©: Routera(contig)sntp server 172.97.0.1 O b.Routera(confighintp server 192.168.0.234, Which command on a port enters the forwarding state immediately when 0/2 aPC is connected toit? * © A suiteh(contig)tspanningtree porttast default O Bomiteh(contig)tspanning-ree portfast bpduguard defaut © © owhch(contigisspanning-ree portast O A rswiteh(contg:ifine spanning-vee portfas Correct answer © A switenicontio)aspanning-ee potas defaut 35, What s the purpose of a southbound API in a control based networking 2/2 architecture? * © A tacities eommuniceton between the cantrllr and the applications O B integrates a controller wth other automation and orchestration tools © C allows application developers to interact with the network © 2 tacitves communication between the conteller and the networking hardware36, What are two descriptions of three-tier network topologies? (Choose o/2 two)" A The core and datioution ayers perform the same functions in ciferent domains (0 2 the acces: manages routing between dev C. The network core is designed 1 maintain continuous connectivity when devices fail , The cote layer maintalne wited connections for each host (0) E The ltrisuton layer suns Layer 2 and Layer 3 technologies Correct answer The network core is designed to maintaln continuous connectivity when devices fail , The distribution layer runs Layer 2 and Layer 3 technologies37, An organization has decided to start using cloud-provided services. Which 2/2 cloud service allows the organization to install its own operating system on a Virtual machine? * O Aplattormase-serice O Bi sotmare-as-a-service O Cc networkasa-cervice © dintrastructureas--service38, Which two statements about EtherChannel technology are true? (Choose 0/2 two)" | EtherChannel provides increased bandwith by bundling existing FastEthernet or Gigabit Ethemet interfaces into a single EtherChanne! 8. STP doesnot black EtherChannl inks Cy © Youcan confi utp eran inks between wo sith, ang pt limit of sinteen physical ports ©. EtherChannel doesnot allow load sharing of traffic among the physical inks within O the etherchannel (0) Eetherchannel allows redunceney in ease one or mare links inthe EtherChannel ail Correct answer [A therChannel provides inceased bandwidth by buncling existing FastEthernet or ‘Gigabit Etheret interfaces into a single EtherChannel .EtherChannel allows redundancy Incase one or more inks nthe EtherChannel fall39. Which command must you enter to guarantee that an HSRP router with 2/2 higher priority becornes the HSRP primary router after tis reloaded? * © A-standty 10 version @s © C-standty 10 version 2 by 10 priory 150, 40, An administrator configures the following ACL in order to prevent devices 2/2 Con the 192.168.1.0 subnet of Router A from accessing the server at 10.115 ‘access-list 100 deny ip 192,168.10 0.0.0.255 host 10:11.5 access-list 100 ppermit ip any any Where should the administrator place this ACL for the most efficient use of network resources? * © A inbound on router A Fa0/0 O Breurbound on router B Fa0/0 © © outbound on router AFa0/1 © P inbound on router F200"41, Anetwork administrator must permit SSH access to remotely manage 2/2, routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task? * O accesstist 20 permit udp 10:20:1.000.0:255 © Brno access ist 20 deny ep any 10.20.1.00.0..127 e922 © © acces O Dine access tit 2699 de Ist 120 permittep ary 10.20.1.00.0.0.256 e422 Ip any 1020.1.000.0255 42, Which effect does the aga new-model configuration command have? * 2/2 © A teenntigues the device to connect to a RADIUS server for AAA © Bittcontigues alocaluser on the devie O © trassoclates to RADIUS server te an AAA grou, © dittenabies AAA services on the devi,43. What is the primary difference between AAA authentication and 22 authorization? * © Authentication verifies a usemame ard password and authorzation handles he ‘communication between the authentication agent and the user database © 2. Autenteation deities a use who tempting to acces a aystem ans authorization valdates the users password @ “futon dentin and veins a user whois atemptng to secess a tem, and authorization controls the tasks the user ean perform © D-Authenteaton conta the system processes a user can acess and autoratlon logs 9 activities the user initiates 44, Which configuration is needed to generate an RSAkey forSSHona 2/2 router? © A configure the version of SH © 2 configure vrv access O ccreatea user wit password © 2.Assign a ONS domain name45, When a site-to-site VPN is used, which protocolis responsible forthe 2/2 transport of user data? * O Awe O een © cae © o.mos 46, Which command prevents passwords from being stored in the on configuration as plaintext on a router or switch? * © Acenable secret © B.sewice passwordeneryption Oo O Prenable password semame Cisco password encrypt Correct answer © B sence passwordeneryption47. Which type of attack can be mitigated by dynamic ARP inspection? 2/2 O Armatware © 8.0008 © worm © 0 maniethemidate 48, Which IPvé adress type provides communication between subnets and 0/2 cannot route on the Internet? * O A slobat unicast © unique loca © © tnkioca © o-muticast Correct answer © P unique oes49, What's the expected outcome when an EU-64 address is generated? * 0/2 © A The seventh bit ofthe original MAC address of the inter O 8 The itera The characters O inate © 0. The mac adéress ofthe interface is used asthe interface ID without modification Dis configured as a random 64-bit value re Inserted a the beginning ofthe MAC address ofthe Correct answer © A The sevent st ofthe original MAC adress ofthe interfaces inverted 50. Which command must be present in a Cisco Device configurationto 2/2 tenable the device to resolve an FQDN? * O Aiphost O Biipnameserver © © pdomainsookup O Dilp domate-name‘Submission Tracking ID - DO NOT CHANGE * ‘hist impotant for tracking purposes. Oo nat change Any charge in ths wll make your submission void 3 "Wis comers ether ated or endorsed by Goole ~Tamat Seve Say Eley Google For
You might also like
The Yellow House: A Memoir (2019 National Book Award Winner)
From Everand
The Yellow House: A Memoir (2019 National Book Award Winner)
Sarah M. Broom
4/5 (100)
Principles: Life and Work
From Everand
Principles: Life and Work
Ray Dalio
4/5 (643)
The Unwinding: An Inner History of the New America
From Everand
The Unwinding: An Inner History of the New America
George Packer
4/5 (45)
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
From Everand
A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story
Dave Eggers
3.5/5 (233)
The World Is Flat 3.0: A Brief History of the Twenty-first Century
From Everand
The World Is Flat 3.0: A Brief History of the Twenty-first Century
Thomas L. Friedman
3.5/5 (2289)
The Emperor of All Maladies: A Biography of Cancer
From Everand
The Emperor of All Maladies: A Biography of Cancer
Siddhartha Mukherjee
4.5/5 (298)
Manhattan Beach: A Novel
From Everand
Manhattan Beach: A Novel
Jennifer Egan
3.5/5 (919)
Rise of ISIS: A Threat We Can't Ignore
From Everand
Rise of ISIS: A Threat We Can't Ignore
Jay Sekulow
3.5/5 (144)
The Glass Castle: A Memoir
From Everand
The Glass Castle: A Memoir
Jeannette Walls
4.5/5 (1856)
Fear: Trump in the White House
From Everand
Fear: Trump in the White House
Bob Woodward
3.5/5 (836)
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
From Everand
The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are
Brené Brown
4/5 (1175)
Team of Rivals: The Political Genius of Abraham Lincoln
From Everand
Team of Rivals: The Political Genius of Abraham Lincoln
Doris Kearns Goodwin
4.5/5 (244)
Shoe Dog: A Memoir by the Creator of Nike
From Everand
Shoe Dog: A Memoir by the Creator of Nike
Phil Knight
4.5/5 (629)
Her Body and Other Parties: Stories
From Everand
Her Body and Other Parties: Stories
Carmen Maria Machado
4/5 (903)
Sing, Unburied, Sing: A Novel
From Everand
Sing, Unburied, Sing: A Novel
Jesmyn Ward
4/5 (1267)
John Adams
From Everand
John Adams
David McCullough
4.5/5 (2546)
Angela's Ashes: A Memoir
From Everand
Angela's Ashes: A Memoir
Frank McCourt
4.5/5 (943)
Steve Jobs
From Everand
Steve Jobs
Walter Isaacson
4.5/5 (1139)
The Light Between Oceans: A Novel
From Everand
The Light Between Oceans: A Novel
M.L. Stedman
4.5/5 (815)
The Perks of Being a Wallflower
From Everand
The Perks of Being a Wallflower
Stephen Chbosky
4.5/5 (4103)
The Outsider: A Novel
From Everand
The Outsider: A Novel
Stephen King
4/5 (2885)
Little Women
From Everand
Little Women
Louisa May Alcott
4.5/5 (2369)