CCNAexamesim2
![]() |
![]() |
![]() |
Título del Test:![]() CCNAexamesim2 Descripción: Exam simulation |




Comentarios |
---|
NO HAY REGISTROS |
What does traffic shaping do to reduce congestion in a network?. buffers and queues packets. buffers without queuing packets. queqes without buffering packets. drops packets. Which 2 statements about extended traceroute command is true? (Choose 2). it can send packets from specified interface or ip add. it can use a specified TTL value. it can validate the reply data. it can use a specificed TOS. it can repeated automatically to a specified interval. Which command can you enter to determine the addresses that have been assigned on a DHCP Server?. Show ip DHCP database. Show ip DHCP pool. Show ip DHCP binding. Show ip DHCP server statistic. Which statement about SNMPv2 is true ?. Its privacy algorithms use MD5 encryption by default. it requires passwords to be encrypyed. Its authetication and privacy algorithms are enable without default values. It requires passwords at least eight characters en length. Which symptom most commonly indicates that 2 connecting interface are configured with a duplex mismatch?. an int with up/down state. an int with down/down state. late collisions on the interface. the spanning tree process shutting down. Which VTP mode can not make a change to vlan?. Server. Client. Transparent. Off. Which function does IP SLA ICMP ECHO operation perform to assist with troubleshooting?. one way jitter measurement. congestion detection. hop-by-hop response time. packet-loss detection. Which mode are in PAgP? (choose two). Auto. Desirable. Active. Passive. On. In an Ethernet network, under what two scenarios can devices transmit? (Choose two.). when they receive a special token. when there is a carrier. when they detect no other devices are sending. when the server grants access. when the medium is idle. Which two protocols are used by bridges and/or switches to prevent loops in a layer 2 network? (Choose two.). 802.1d. VTP. 802.1q. SAP. STP. At which layer of the OSI model does PPP perform?. Layer 2. Layer 3. Layer 4. Layer 5. Layer 1. What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links? (Choose three.). reduced cost. better throughput. broadband incompatibility. increased security. scalability. reduced latency. Which IPv6 header field is equivalent to the TTL?. Scan Timer. TTD. Flow Label. Hop Limit. Hop Count. which port security mode can assist with troubleshooting by keeping count of violations?. access. protect. restrict. shutdown. which 2 options are requirements for configuring ripv2 for ipv4 (choose 2 ) ?. enabling RIP authentication. connecting RIP to a WAN Interface. enabling auto route sumamrization. allowing unicast updates for RIP. enabling RIP on the router. which configuration command can you apply to a hsrp router so that its local interface becomes active if all other routers in the group fail?. standby 1 preempt. no additional config is required. standby 1 priority 250. standby 1 track ethernet. which 2 statement about EIGRP on IPv6 device is true ? (Choose 2). It is configured on the interface . It is globally configured . If is configured using a network statement . It is vendor agnostic. It supports a shutdown feature. which command can you enter to troubleshoot the failure of address assignment ?. sh ip dhcp database. sh ip dhcp pool. sh ip dhcp import. sh ip dhcp server statistics. which three technical services support cloud computing ? (choose 3). network-monitored power sources. layer 3 network routing. ip localization. redundant connections. VPN connectivity. extended SAN services. which two steps must you perform to enbale router-on-stick on a switch ? (Choose 2). connect the router to a trunk port. config the subint number exactly the same as the matching VLAN. config full duplex. cofigure an ip route to the vlan destn net. assign the access port to the vlan. which add prefix does OSPFv3 use when multiple IPv6 address are configured on a single interface ?. all prefix on the interface. the prefix that the administrator configure for OSPFv3 use. the lowest prefix on the interface. the highest prefix on the interface. which IP configuration does the CIDR notation 192.168.1.1/25 refer ?. 192.168.1.1 255.255.255.64. 192.168.1.1 255.255.255.1. 192.168.1.1 255.255.255.32. 192.168.1.1 255.255.255.256. 192.168.1.1 255.255.255.128. CIDR notation (255.255.255.252 ) / notation ?. 30. 31. 32. 33. Which two of these statements regarding RSTP are correct ? (Choose two). RSTP cannot operate with PVST+. RSTP defines new port roles. RSTP defines no new port states. RSTP is a proprietary implementation of IEEE 802.1D STP. RSTP is compatible with the original IEEE 802.1D STP. What is known as one-to-nearest addressing in IPv6 ?. global unicast. anycast. multicast. unspecified address. When a device learns multiple routes to a specific network, it installs the route with : longest bit Match (highest subnet Mask). lowest AD. lowest metric. equal load balancing. Requirement to configure DHCP binding (Choose 2). DHCP pool. ip address. Hardware address. other option. how to see dhcp conflict ?. show ip dhcp pool. show dhcp database. show ip dhcp conflict. Other Option. What type of MAC address is aged automatically by the switch?. Dynamic. Static. Auto. One more option. Which major component of the network virtualization architecture isolate users according to policy?. policy enforcement. network access control. network services virtualization. path isolation. Which two statements about firewalls are true ? (Choose 2). They can be used with an intrusion prevention system. They can limit unauthorized user access to protect data. Each wireless access point requires its own firewall. They must be placed only at locations where the private network connects to the internet. They can prevent attacks from the internet only. Which two statements about data VLANs on access ports are true ? ( Choose two). They can be configured as trunk ports. Two or more VLANs can be configured on the interface. 802.1Q encapsulation must be configured on the interface. Exactly one VLAN can be configured on the interface. They can be configured as host ports. Where does the configuration reside when a helper address is configured to support DHCP ?. on the switch trunk interface. on the router closest to the client. on the router closest to the server. on every router along the path. Which command can you enter to configure an IPV6 floating static route?. Router(config)# ipv6 route static resolve default. Router(config)# ipv6 route::/0 serail0/1. Router(config)# ipv6 route FE80:0202::/32 serail 0/1 201. Router(config)# ipv6 route FE80:0202::/32 serail 0/1 1. How does NAT overloading provide one-to-many address translation?. It uses a pool of addresses. It converts IPV4 addresses to unused IPv6 Addresses. assigns a unique TCP/UDP port to each session. It uses virtual MAC Address and Virtual IP Addresses. Which three options are types of Layer 2 network attack ? (Choose three). Spoofing attacks. Vlan Hopping. botnet attacks. DDOS attacks. ARP Attacks. Brute force attacks. What does split-horizon do?. Prevent routing loop in distance vector protocol. Prevent switching loop in distance vector protocol. Prevent switching loop in link-state protocol. Prevent routing loop in link-state protocol. After you apply the given configuration to R1, you notice that it failed to enable OSPF. Which action can you take to correct the problem?. Configure a loopback interface on R1. Enable IPv6 unicast routing on R1. Configure an IPv4 address on interface FO/0. Configure an autonomous system number on OSPF. How many broadcast domains are shown in the graphic assuming only the default VLAN is confgured on the switches?. 1. 2. 6. 12. Which three statements correctly describe Network Device A? (Choose three.). With a network wide mask of 255.255.255.128, each interface does not require an IP address. With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet. With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other. With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other. With a network wide mask of 255.255.254.0, each interface does not require an IP address. At the end of an RSTP election process, which access layer switch port will assume the discarding role?. Switch3, port fa0/1. Switch3, port fa0/12. Switch4, port fa0/11. Switch4, port fa0/2. Switch3, port Gi0/1. Switch3, port Gi0/2. Why is flash memory erased prior to upgrading the IOS image from the TFTP server?. The router cannot verify that the Cisco IOS image currently in flash is valid. Flash memory on Cisco routers can contain only a single IOS image. Erasing current flash content is requested during the copy dialog. In order for the router to use the new image as the default, it must be the only IOS image in flash. The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.). Configure the gateway on Host A as 10.1.1.1. Configure the gateway on Host B as 10.1.2.254. Configure the IP address of Host A as 10.1.2.2. Configure the IP address of Host B as 10.1.2.2. Configure the masks on both hosts to be 255.255.255.224. Configure the masks on both hosts to be 255.255.255.240. Which utility can you use to identify the cause of a traffic-flow blockage between the two devices in a network?. ACL path analysis tool in APIC-EM. IWAN application. ACL analysis tool in APIC-EM. APIC-EM automation scheduler. Which IEEE mechanism is responsible for the authentication of devices when they attempt to connect to a local network?. 802.1x. 802.11. 802.2x. 802.3x. When a router is unable to find a known route in the routing table, how does it handle the packet?. It discards the packet. It sends the packet over the route with the best metric. It sends the packet to the next hop address. It sends the packet to the gateway of last resort. If router R1 knows a static route to a destination network and then learns about the same destination network through a dynamic routing protocol, how does R1 respond?. It refuses to advertise the dynamic route to other neighbors. It sends a withdrawal signal to the neighboring router. It disables the routing protocol. It prefers the static route. Which two statements about floating static routes are true? (Choose two). They are routes to the exact /32 destination address. They are used when a route to the destination network is missing. They have a higher administrative distance than the default static route administrative distance. They are used as back-up routes when the primary route goes down. They are dynamic routes that are learned from a server. Refer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to which IP address does it send the packet ?. 192.168.14.4. 192.168.12.2. 192.168.13.3. 192.168.15.5. What is the danger of the permit any entry in a NAT access list?. It can lead to overloaded resources on the router. It can cause too many addresses to be assigned to the same interface. It can disable the overload command. It prevents the correct translation of IP addresses on the inside network. How does a DHCP server dynamically assign IP addresses to hosts ?. Addresses are permanently assigned so that the host uses the same address at all times. Addresses are assigned for a fixed period of time. Addresses are leased to hosts. A host will usually keep the same address by periodically contacting the DHCP server to renew the lease. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement. Refer to the exhibit. What two results would occur if the hub were to be replaced with a switch that is configured with one Ethernet VLAN? (Choose two.). The number of collision domains would remain the same. The number of collision domains would decrease. The number of collision domains would increase. The number of broadcast domains would remain the same. The number of broadcast domains would decrease. The number of broadcast domains would increase. Refer to the exhibit, you determine that Computer A cannot ping Computer Which reason for the problem is most likely true?. The Subnet mask for Computer A is incorrect. The default gateway address for Computer A is incorrect. The subnet mask for computer B is incorrect. The default gateway address for computer B is incorrect. Which effect of the passive-interface command on R1 is true?. It prevents interface Fa0/0 from sending updates. Interface Fa 0/0 operates in RIPv1 mode. It removes the 172.16.0.0 network from all updates on all interfaces on R1. It removes the 172.17.0.0 network from all updates on all interfaces on R1. Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three). session. transport. presentation. application. data-link. network. When is the most appropriate time to escalate an issue that you troubleshooting?. When you lack the proper to resolve the issue. When a more urgent issue that requires your intervention is detected. When you have gathered all information about an issue. When you have been unable to resolve the issue after 30 min. Which two command can you enter to display the current time sources statistics on devices ? (Choose TWO). Show ntp associations. Show clock details. Show clock. Show time. Show ntp status. When you enable PortFast on a switch port, the port immediately transitions to which state?. Blocking. Forwarding. Learning. Listening. Which path does a router choose when it receives a packet with multiple possible paths to the destination over different routing protocols?. the path with both the lowest administrative distance and the highest metric. the path with the lowest administrative distance. the path with the lowest metric. the path with both the lowest administrative distance and lowest metric. Which command is used to know the duplex speed of serial link?. show line. show interface. show protocol. show run. What command is used to configure a switch as authoritative NTP server ?. switch(config)#ntp master 3. switch(config)#ntp peer 193.168.2.2. switch(config)#ntp server 193.168.2.2. switch(config)#ntp source 193.168.2.2. Which address class includes network 191.168.0.1/27?. Class C. Class B. Class D. Class A. On which type of port can switches interconnect for multi-VLAN communication?. interface port. access port. switch port. trunk port. Refer to the exhibit. If R1 sends traffic to 192.168.101.45 the traffic is sent through which interface?. FastEthernet0/1. FastEthernet0/0. FastEthernet1/0. FastEthernet1/1. |