option
Cuestiones
ayuda
daypo
buscar.php

CCNAexamsim1

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
CCNAexamsim1

Descripción:
Exam simulation

Fecha de Creación: 2018/01/11

Categoría: Informática

Número Preguntas: 61

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Which of the following encrypts the traffic on a leased line ?. Telnet. SSH. VTP. VPN. DMVPN.

How do you configure a hostname ?. Router(config)#hostname R1. Nope. No. Not.

How do you maintain security in multiple websites?. VPN. DMVPN. Other. Other.

Refer to the exhibit. Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4. What will Switch-1 do with this data?. Switch-1 will drop the data because it does not have an entry for that MAC address. Switch-1 will flood the data out all of its ports except the port from which the data originated. Switch-1 will send an ARP request out all its ports except the port from which the data originated. Switch-1 will forward the data to its default gateway.

What routing protocol use first-hand information from peers?. link-state. distance-vector. path-vector. other.

What field is consist of 6 bytes in the field identification frame in IEEE 802.1Q ?. SA. DA. FCS. other.

What is new in HSRPv2 ?. Preempt. A greater number in HSRP group field. other. other.

What is true about MPLS ?. It use a label to separate traffic from several costumer. It use IPv4 IPv6. other. other.

A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the internet. Which ACL can be used?. Reflexive. Extended. Standard. Dynamic.

Which command is necessary to permit SSH or Telnet access to a Cisco switch that is otherwise configured for these vty line protocols ?. transport type all. transport output all. transport preferred all. transport input all.

What should be part of a comprehensive network security plan ?. Allow users to develop their own approach to network security. Physically secure network equipment from potential access by unauthorized individuals. Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten. Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported. Minimize network overhead by deactivating automatic antivirus client updates.

Which two Cisco IOS commands, used in troubleshooting, can enable debug output to a remote location ? (Choose two). no logging console. logging host ip-address. terminal monitor. show logging | redirect flashioutput.txt. snmp-server enable traps syslog.

Which component of the Cisco SDN solution serves as the centralized management system ?. Cisco OpenDaylight. Cisco ACI. Cisco APIC. Cisco IWAN.

What command can you enter in config mode to create DHCP pool ?. ip dhcp pool DHCP_pool. ip dhcp exclude -add. ip dhcp conflict logging. service dhcp.

Which utility can you use to determine whether a switch can send echo requests and replies?. Ping. Traceroute. SSH. Telnet.

What is the two benefits of DHCP snooping ? (Choose two). static reservation. DHCP reservation. prevent DHCP rouge server. prevent untrusted host and servers to connect.

What are the three major components of Cisco network virtualization ? (Choose Three). network access control. path isolation. virtual network services. policy enforcement.

Which feature is config by setting a variance that is at least 2 times the metric ?. unequal cost load balancing. path selection. equal cost load balancing. path count.

Standard industrialized protocol of etherchannel ?. LACP. PAgP. PRP. REP.

Two features of the extended ping command ? (Choose two). It can send a specific number of packet. It can send packet from specified interface of IP address. It can resolve the destination host name. It can ping multiple host at the same time.

What command is used to configure a switch as authoritative NTP server ?. Switch(config)#ntp master 3. Switch(config)#ntp peer IP. Switch(config)#ntp server IP. Switch(config)#ntp source IP.

Which two statements about syslog logging are true? (Choose two). Syslog logging is disabled by default. Messages are stored in the internal memory of device. Messages can be erased when device reboots. Messages are stored external to the device. The size of the log file is dependent on the resources of the device.

How to enable vlans automatically across multiple switches ?. Configure VLAN. Confiture NTP. Configure each VLAN. Configure VTP.

Which password types are encrypted ?. SSH. Telnet. enable secret. enable password.

What is the binary pattern of unique ipv6 unique local address ?. 00000000. 11111100. 11111111. 11111101.

Which statement about ACLs is true ?. An ACL have must at least one permit action, else it just blocks all traffic. ACLs go bottom-up through the entries looking for a match. An ACL has a an implicit permit at the end of ACL. ACLs will check the packet against all entries looking for a match.

What is the cause of the Syslog output messages ?. The EIGRP neighbor on Fa0/1 went down due to a failed link. The EIGRP neighbor connected to Fa0/1 is participating in a different EIGRP process, causing the adjacency to go down. A shut command was executed on interface Fa0/1, causing the EIGRP adjacency to go down. Interface Fa0/1 has become error disabled, causing the EIGRP adjacency to go down.

What are contained in layer 2 ethernet frame ? (Choose Three.). Preamble. TTL. Type/length. Frame check sequence. version. others.

Describe the best way to troubleshoot and isolate a network problem ?. Create an action plan. Implement an action plan. Gather facts. others.

Under normal operations, Cisco recommends that you configure switch ports on which vlan ?. on the default vlan. on the management vlan. on the native vlan. on any vlan except the default vlan.

In which byte of an IP packet can traffic be marked ?. the QoS byte. the CoS byte. the ToS byte. the DSCP byte.

Which command can you enter to route all traffic that is destined to 192.168.0.0/20 to a specific interface ?. ip route 192.168.0.0 255.255.240.0 gi 0/1. ip route 192.168.0.0 255.255.255.0 gi 0/1. ip route 0.0.0.0 0.0.0.0 gi 0/1. ip route 0.0.0.0 255.255.255.0 gi 0/.

Which two protocol can detect native vlan mismatch errors? (Choose two.). CDP. VTP. DTP. STP. PAgP.

Which three options are switchport config that can always avoid duplex mismatch error between the switches? (Choose Three.). set both side on auto-negotation. set both sides on half-duplex. set one side auto and other side half-duplex. set both side of connection to full-duplex. set one side auto and other side on full-duplex. set one side full-duplex and other side half-duplex.

What are two benefits of Private IPv4 Addresses? (Choose two.). they can be implemented without requiring admin to coordinate with IANA. they are managed by IANA. increase the flexibility of network design. provide network isloation from the internet. they are routable over internet.

How many bits represent network id in a IPv6 address ?. 32. 48. 64. 128.

"An interface which we have to determine from the routing the route learned by which routing protocol" (Exhibit missing). EIGRP. OSPF. RIP. BGP.

Which WAN topology is most appropriate for a centrally located server farm with several satellite branches ?. star. hub and spoke. point-to-point. full mesh.

Which function allows EIGRP peers to receive notice of implementing topology changes?. successors. advertised changes. goodbye messages. expiration of the hold timer.

If you configure syslog messages without specifying the logging trap level, which log messages will the router send ?. informational messages only. warning and error conditions only. normal but significant conditions only. error conditions only. all levels except debugging.

Which three options are benefits of using TACACS+ on a device? (Choose three). It ensures that user activity is untraceable. It provides a secure accounting facility on the device. device-administration packets are encrypted in their entirely. It allows the user to remotely access devices from other vendors. It allows the users to be authenticated against a remote server. It supports access-level authorization for commands.

What layer of the OSI Model is included in TCP/IP Model's INTERNET layer ?. Application. Session. Data link. Presentation. Network.

Which two of these are characteristics of the 802.1Q protocol? (Choose two.). It is used exclusively for tagging VLAN frames and does not address network reconvergence following switched network topology changes. It modifies the 802.3 frame header, and thus requires that the FCS be recomputed. It is a Layer 2 messaging protocol which maintains VLAN configurations across networks. It includes an 8-bit field which specifies the priority of a frame. It is a trunking protocol capable of carrying untagged frames.

Which two features can dynamically assign IPv6 addresses? (Choose two.). IPv6 stateless autoconfiguration. DHCP. NHRP. IPv6 stateful autoconfiguration. ISATAP tunneling.

A security administrator wants to profile endpoints and gain visibility into attempted authentications. Which 802.1x mode allows these actions ?. Monitor mode. High-Security mode. Low-impact mode. Closed mode.

How to verify strong and secured SSH connection ?. ssh -v 1 -l admin 10.1.1.1. ssh -v 2 -l admin 10.1.1.1. ssh -l admin 10.1.1.1. ssh v 2 admin 10.1.1.1.

How many usable host are there per subnet if you have the address of 192.168.10.0 with a subnet mask of 255.255.255.240 ?. 4. 8. 16. 14.

What interconnection cable can you use when you use a MDI connection ?. cut-through. straight-through. crossover. rollover.

Which Cisco platform can verify ACLs ?. Cisco Prime Infrastructure. Cisco Wireless LAN Controller. Cisco APIC-EM. Cisco IOS-XE.

In order to comply with new auditing standards, a security administrator must be able to correlate system security alert logs directly with the employee who triggers the alert. Which of the following should the security administrator implement in order to meet this requirement?. Access control lists on file servers. Elimination of shared accounts. Group-based privileges for accounts. Periodic user account access reviews.

When you deploy multilink PPP on your network, where must you configure the group IP Address on each device ?. In the global config. Under serial interface. Under the routing protocol. Under the multilink interface.

If you want multiple hosts on a network, where do you configure the setting ?. in the IP protocol. in the multicast interface. in the serial interface. in the global configuration.

Which option is the benefit of implementing an intelligent DNS for a cloud computing solution ?. It reduces the need for a backup data center. It can redirect user requests to locations that are using fewer network resources. It enables the ISP to maintain DNS records automatically. It eliminates the need for a GSS.

Which statement about the IP SLAs ICMP Echo operation is true?. The frequency of the operation is specified in milliseconds. It is used to identify the best source interface from which to send traffic. It is configured in enable mode. It is used to determine the frequency of ICMP packets.

Which action can change the order of entries in a named access-list ?. removing an entry. opening the access-list in notepad. adding an entry. resequencing.

How does a router handle an incoming packet whose destination network is missing from the routing table ?. it broadcast the packet to each interface on the router. it discards the packet. it broadcasts the packet to each network on the router. it routes the packet to the default route.

Which two components are used to identify a neighbor in a BGP configuration? (Choose two.). autonomous system number. version number. router ID. subnet mask. IP address.

Which three statements about HSRP operation are true? (Choose three.) ?. The virtual IP address and virtual MAC address are active on the HSRP Master router. The HSRP default timers are a 3 second hello interval and a 10 second dead interval. HSRP supports only clear-text authentication. The HSRP virtual IP address must be on a different subnet than the routers’ interfaces on the same LAN. The HSRP virtual IP address must be the same as one of the router’s interface addresses on the LAN. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

Which two options describe benefits of aggregated chassis technology ( choose 2) ?. it reduces management overhead. switches can be located anywhere regardless of there physical location. it requires only 1 IP add per VLAN. it requires only 3 IP add per VLAN. it supports HSRP VRRP GLBP. it support redundant configuration files.

How to trouble DNS issue ( choose two) ?. Ping a public website IP address. Ping the DNS Server. Determine whether a DHCP address has been assigned. Determine whether the hardware address is correct. Determine whether the name servers have been configured.

Which utility can you use to identify redundant or shadow rules ?. The ACL trace tool in Cisco APIC-EM. The ACL analysis tool in Cisco APIC-EM. The Cisco APIC-EM automation scheduler. The Cisco IWAN application.

Denunciar Test