CCNAexamsim3
![]() |
![]() |
![]() |
Título del Test:![]() CCNAexamsim3 Descripción: Exam simulation |




Comentarios |
---|
NO HAY REGISTROS |
Which IPV6 function serves the same purpose as ARP entry verification on an IPv4 network?. interface ip address verification. MAC address table verification. neighbor discovery verification. Routing table entry verification. Which HSRP feature was new in HSRPv2?. VLAN group numbers that are greater than 255. Virtual MAC addresses. tracking. preemption. Refer to exhibit. Which command can you enter to verify link speed and duplex setting on the interface?. router#show ip protocols. router#show startup-config. router#show line. router#show interface gig 0/1. Which two statements about unique local IPv6 addresses are true?. They are identical to IPv4 private addresses. They are defined by RFC 1884. They use the prefix FEC0::/10. They use the prefix FC00::/7. They can be routed on the IPv6 global internet. Which DTP switch port mode allows the port to create a trunk link if the neighboring port is in trunk mode, dynamic desirable mode, or desirable auto mode?. trunk. access. dynamic desirable. dynamic auto. When you troubleshoot an IPv4 connectivity issue on a router, which three router configuration checks you must perform?. Verify that the router interface IP address is correct. Verify that the DNS is configured correctly. Verify that the router and the host use the same subnet mask. Verify that the router firmware is up-to-date. Verify that a default route is configured. Verify that the route appears in the Routing table. Configuration of which option is required on a Cisco switch for the Cisco IP phone to work?. PortFast on the interface. the interface as an access port to allow the voice VLAN ID. a voice VLAN ID in interface and global configuration mode. Cisco Discovery Protocol in global configuration mode. Which method does a connected trunk port use to tag VLAN traffic?. IEEE 802 1w. IEEE 802 1D. IEEE 802 1Q. IEEE 802 1p. Which RFC was created to alleviate the depletion of IPv4 public addresses?. RFC 4193. RFC 1519. RFC 1518. RFC 1918. What is the default lease time for a DHCP binding?. 24 hours. 12 hours. 48 hours. 36 hours. Which NAT type is used to translate a single inside address to a single outside address?. dynamic NAT. NAT overload. PAT. Static NAT. Which network topology allows all traffic to flow through a central hub?. Bus. Star. Mesh. Ring. Which statement about a router on a stick is true?. Its date plane router traffic for a single VI AN over two or more switches. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs on the same subnet. It requires the native VLAN to be disabled. It uses multiple subinterfaces of a single interface to encapsulate traffic for different VLANs. By default, how many MAC addresses are permitted to be learned on a switch port with port security enabled?. 8. 2. 1. 0. Which device allows users to connect to the network using a single or double radio?. access point. switch. wireless controller. firewall. When enabled, which feature prevents routing protocols from sending hello messages on an interface?. virtual links. passive-interface. directed neighbors. OSPF areas. Refer to the exhibit. Which statement describes the effect of this configuration?. The VLAN 10 VTP configuration is displayed. VLAN 10 spanning-tree output is displayed. The VLAN 10 configuration is saved when the router exits VLAN configuration mode. VLAN 10 is added to the VLAN database. Which route source code represents the routing protocol with a default administrative distance of 90 in the routing table?. S. E. D. R. O. Which statement about native VLAN traffic is true?. Cisco Discovery Protocol traffic travels on the native VLAN by default. Traffic on the native VLAN is tagged with 1 by default. Control plane traffic is blocked on the native VLAN. The native VLAN is typically disabled for security reasons. Which statement about unicast frame forwarding on a switch is true?. The TCAM table stores destination MAC addresses. If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on. The CAM table is used to determine whether traffic is permitted or denied on a switch. The source address is used to determine the switch port to which a frame is forwarded. Which component of the routing table ranks routing protocols according to their preferences?. administrative distance. next hop. metric. routing protocol code. Which switch would STP choose to become the root bridge in the selection process?. 32768: 11-22-33-44-55-66. 32768: 22-33-44-55-66-77. 32769: 11-22-33-44-55-65. 32769: 22-33-44-55-66-78. Refer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two.). All of the routers need to be configured for backbone Area 1. R1 and R2 are the DR and BDR, so OSPF will not establish neighbor adjacency with R3. A static route has been configured from R1 to R3 and prevents the neighbor adjacency from being established. The hello and dead interval timers are not set to the same values on R1 and R3. EIGRP is also configured on these routers with a lower administrative distance. R1 and R3 are configured in different areas. For what two purposes does the Ethernet protocol use physical addresses? (Choose two.). to uniquely identify devices at Layer 2. to allow communication with devices on a different network. to differentiate a Layer 2 frame from a Layer 3 packet. to establish a priority system to determine which device gets to transmit first. to allow communication between different devices on the same network. to allow detection of a remote device when its physical address is unknown. 2 authentication type of MLPPP. PEAP. LEAP. PAP. CHAP. TACACS+. What is the effect of the overload keyword in a static NAT translation configuration?. It enables port address translation. It enables the use of a secondary pool of IP addresses when the first pool is depleted. It enables the inside interface to receive traffic. It enables the outside interface to forward traffic. What are the requirements for running VTP (choose two). VTP domain names must be different. VTP domain names must be the same. VTP server must have the highest revision numbers. All devices need to have the same VTP version. What is the use of IPv4 private space (choose two). connect applications together. save global address space. something about NAT. allow intra-company communication. Assuming a subnet mask of 255.255.248.0, three of the following addresses are valid host addresses. Which are these addresses? (Choose three.). 172.16.9.0. 172.16.8.0. 172.16.31.0. 172.16.20.0. Which type does a port become when it receives the best BPDU on a bridge?. The designated port. The backup port. The alternate port. The root port. Which value can you modify to configure a specific interface as the preferred forwarding interface?. The interface number. The port priority. The VLAN priority. The hello time. Which statement about VLAN configuration is true?. The switch must be in VTP server or transparent mode before you can configure a VLAN. The switch must be in config-vlan mode before you configure an extended VLAN. Dynamic inter-VLAN routing is supported on VLAN2 through VLAN 4064`. A switch in VTP transparent mode save the VLAN databases to the running configuration only. Refer to the exhibit. Which switch provides the spanning-tree designated port role for the network segment that services the printers?. Swicth1. Swicth2. Swicth3. Swicth4. In which two situations should you use out-of-band management?. when a network device fails to forward packets. when you require ROMMON access. when management applications need concurrent access to the device. when you require administrator access from multiple locations. when the control plane fails to respond. Which command can you enter to configure a local username with an encrypted password and EXEC mode user privileges?. Router(config)#username jdone privilege 1 password 7 08314D5D1A48. Router(config)#username jdone privilege 1 password 7 PASSWORD1. Router(config)#username jdone privilege 15 password 0 08314D5D1A48. Router(config)#username jdone privilege 15 password 0 PASSWORD1. What happens when an 802.11a node broadcasts within the range of an 802.11g access point?. The access point transmits, but the node is unable to receive. A connection occurs. Both the node and the access point are unable to transmit. The node transmits, but the access point is unable to receive. Which value is indicated by the next hop in a routing table?. preference of the route source. IP address of the remote router for forwarding the packets. how the route was learned. exit interface IP address for forwarding the packets. Which statement about the inside interface configuration in a NAT deployment is true?. It is defined globally. It identifies the location of source addresses for outgoing packets to be translated using access or route maps. It must be configured if static NAT is used. It identifies the public IP address that traffic will use to reach the internet. Which option is the default switch port port-security violation mode?. shutdown. protect. shutdown vlan. restrict. Which entity assigns IPv6 addresses to end users?. ICANN. APNIC. RIR. ISPs. which value indicate the distance from the ntp authoritative time source?. priority. location. layer. stratum. Which NTP type designates a router without an external reference clock as an authoritative time source?. server. peer. master. client. Which 3 feature are represented by A letter in AAA? (Choose Three). authorization. accounting. authentication. accountability. accessibility. authority. Which of the following are the valid numbers of standard ACL (choosse 2). 50. 1550. 150. 1250. 2050. When you deploy multilink PPP on your network, where must you configure the group IP Address on each device?. in the global config. Under serial interface. Under the routing protocol. Under the multilink interface. What are two statement for SSH?. use port 22. unsecured. encrypted. most common remote-access method. operate at transport. If a route is not present in the routing table for a particular destination, what would the router do?. Default route. Flood. Drop. No Answer. Host is able to ping a web server but it is not able to do HTTP request. ACL blocking port 23. ACL blocking All ports. ACL blocking port 80. ACL blocking port 443. None of the above. Which NTP command configures the local devices as an NTP reference clock source?. NTP Peer. NTP Broadcast. NTP Master. NTP Server. Which item represents the standard IP ACL?. Access-list 110 permit any any. Access-list 50 deny 192.168.1.1 0.0.0.255. Access list 101 deny tvp any host 192.168.1.1. Access-list 2500 deny tcp any host 192.168.1.1 eq 22. Which command can you enter to verify that a 128-bit address is live and responding?. Traceroute. telnet. ping. ping ipv6. Where information about untrusted hosts are stored?. CAM table. Trunk table. MAC table. binding database. What is one benefit of PVST+?. PVST+ supports Layer 3 load balancing without loops. PVST+ reduces the CPU cycles for all the switches in the network. PVST+ allows the root switch location to be optimized per VLAN. PVST+ automatically selects the root bridge location, to provide optimized bandwidth usage. Which statement about VLAN operation on Cisco Catalyst switches is true?. When a packet is received from an 802.1Q trunk, the VLAN ID can be determined from the source MAC address and the MAC address table. Unknown unicast frames are retransmitted only to the ports that belong to the same VLAN. Broadcast and multicast frames are retransmitted to ports that are configured on different VLAN. Ports between switches should be configured in access mode so that VLANs can span across the ports. Three switches are connected to one another via trunk ports. Assuming the default switch configuration, which switch is elected as the root bridge for the spanning-tree instance of VLAN 1?. the switch with the highest MAC address. the switch with the lowest MAC address. the switch with the highest IP address. the switch with the lowest IP address. Which two options are primary responsibilities of the APlC-EM controller? (Choose two.). lt automates network actions between different device types. lt provides robust asset management. lt tracks license usage and Cisco lOS versions. lt automates network actions between legacy equipment. lt makes network functions programmable. Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?. ping address. tracert address. traceroute address. arp address. Which two statements are true about interVLAN routing in the topology that is shown in the exhibit? (Choose two.). Host E and host F use the same IP gateway address. Router1 and Switch2 should be connected via a crossover cable. Router1 will not play a role in communications between host A and host D. The FastEthernet 0/0 interface on Router1 must be configured with subinterfaces. Router1 needs more LAN interfaces to accommodate the VLANs that are shown in the exhibit. The FastEthernet 0/0 interface on Router1 and the FastEthernet 0/1 interface on Switch2 trunk ports must be configured using the same encapsulation type. What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?. path cost. lowest port MAC address. VTP revision number. highest port priority number. port priority number and MAC address. lf RTRO1 as configured as shown, which three addresses will be received by other routers that are running ElGRP on the network? (Choose three.). 172.16.4.0. 10.0.0.0. 172.16.0.0. 192.168.2.0. 192.168.0.0. 10.4.3.0. |