CCNAtogo5
![]() |
![]() |
![]() |
Título del Test:![]() CCNAtogo5 Descripción: Course certification |




Comentarios |
---|
NO HAY REGISTROS |
Which condition indicates that service password-encryption is enabled?. The local username password is in clear text in the configuration. The enable secret is in clear text in the configuration. The local username password is encrypted in the configuration. The enable secret is encrypted in the configuration. Which protocol advertises a virtual IP address to facilitate transparent failover of a Cisco routing device?. FHRP. DHCP. RSMLT. ESRP. What is the correct routing match to reach 172.16.1.5/32 ?. 172.16.1.0/26. 172.16.1.0/25. 172.16.1.0/24. the default route. Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?. transport. network. presentation. session. application. What is the purpose of the POST operation on a router ?. determine whether additional hardware has been added. locate an IOS image for booting. enable a TFTP server. set the configuration register. Which protocol is the Cisco proprietary implementation of FHRP ?. HSRP. VRRP. GLBP. CARP. Which three characteristics are representative of a link-state routing protocol? (Choose three.). provides common view of entire topology. exchanges routing tables with neighbors. calculates shortest path. utilizes event-triggered updates. utilizes frequent periodic updates. Which part of the PPPoE server configuration contains the information used to assign an IP address to a PPPoE client?. virtual-template interface. DHCP. dialer interface. AAA authentication. Drag and drop the correct address space on the left to the IPv6 multicast feature or protocol on the right. FF02::5. FF02::A. FF02::D. FF02::1. FF02::2. FF02::6. Which three statements about RSTP are true? (Choose three.). RSTP significantly reduces topology reconverging time after a link failure. RSTP expands the STP port roles by adding the alternate and backup roles. RSTP port states are blocking, discarding, learning, or forwarding. RSTP provides a faster transition to the forwarding state on point-to-point links than STP does. RSTP also uses the STP proposal-agreement sequence. RSTP uses the same timer-based process as STP on point-to-point links. What are two benefits of using NAT? (Choose two.). NAT facilitates end-to-end communication when IPsec is enabled. NAT eliminates the need to re-address all hosts that require external access. NAT conserves addresses through host MAC-level multiplexing. Dynamic NAT facilitates connections from the outside of the network. NAT accelerates the routing process because no modifications are made on the packets. NAT protects network security because private networks are not advertised. Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two.). SW1#show port-secure interface FastEthernet 0/12. SW1#show switchport port-secure interface FastEthernet 0/12. SW1#show running-config. SW1#show port-security interface FastEthernet 0/12. SW1#show switchport port-security interface FastEthernet 0/12. Refer to the exhibit. Given this output for SwitchC, what should the network administrator's next action be?. Check the trunk encapsulation mode for Switch C's fa0/1 port. Check the duplex mode for Switch C's fa0/1 port. Check the duplex mode for Switch A's fa0/2 port. Check the trunk encapsulation mode for Switch A's fa0/2 port. Which statement is correct regarding the operation of DHCP ?. A DHCP client uses a ping to detect address conflicts. A DHCP server uses a gratuitous ARP to detect DHCP clients. A DHCP client uses a gratuitous ARP to detect a DHCP server. If an address conflict is detected, the address is removed from the pool and an administrator must resolve the conflict. If an address conflict is detected, the address is removed from the pool for an amount of time configurable by the administrator. If an address conflict is detected, the address is removed from the pool and will not be reused until the server is rebooted. Which two statements about using the CHAP authentication mechanism in a PPP link are true? (Choose two.). CHAP uses a two-way handshake. CHAP uses a three-way handshake. CHAP authentication periodically occurs after link establishment. CHAP authentication passwords are sent in plaintext. CHAP authentication is performed only upon link establishment. CHAP has no protection from playback attacks. Refer to the exhibit. Switch port FastEthernet 0/24 on ALSwitch1 will be used to create an IEEE 802.1Q-compliant trunk to another switch. Based on the output shown, what is the reason the trunk does not form, even though the proper cabling has been attached?. VLANs have not been created yet. An IP address must be configured for the port. The port is currently configured for access mode. The correct encapsulation type has not been configured. The no shutdown command has not been entered for the port. Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands. Which two of these changes are necessary for SwitchA to meet the requirements? (Choose two.). Port security needs to be globally enabled. Port security needs to be enabled on the interface. Port security needs to be configured to shut down the interface in the event of a violation. Port security needs to be configured to allow only one learned MAC address. Port security interface counters need to be cleared before using the show command. The port security configuration needs to be saved to NVRAM before it can become active. Which three statements about static routing are true? (Choose three.). It uses consistent route determination. It is best used for small-scale deployments. Routing is disrupted when links fail. It requires more resources than other routing methods. It is best used for large-scale deployments. Routers can use update messages to reroute when links fail. What are the address that will show at the show ip route if we configure the above statements?(Choose Three.). 10.0.0.0. 10.4.3.0. 172.15.4.0. 172.15.0.0. 192.168.4.0. 192.168.0.0. Which feature facilitates the tagging of frames on a specific VLAN ?. Routing. Hairpinning. Encapsulation. Switching. What does split horizon prevent?. routing loops, link state. routing loops, distance vector. switching loops, STP. switching loops, VTP. Which value to use in HSRP protocol election process ?. interface. virtual IP address. priority. router ID. Which of the following is needed to be enable back the role of active in HSRP ?. preempt. priority. other options. other options. Which command is used to show the interface status of a router ?. show interface status. show ip interface brief. show ip route. show interface. Which of the following privilege level is the most secured ?. Level 0. Level 1. Level 15. Level 16. Which IPV6 feature is supported in IPV4 but is not commonly used ?. unicast. multicast. anycast. broadcast. Which two statements are true about IPv6 Unique Local Addresses ? (Choose Two.). It is the counterpart of IPv4 private addresses. It uses FC00::/7 as prefix. wrong. wrong. Which range represents the standard access list ?. 99. 150. 299. 2000. What to do when the router password was forgotten ?. use default password cisco to reset. access router physically. use ssl/vpn. Type confreg 0x2142 at the rommon 1. What is true about Cisco Discovery Protocol ?. it discovers the routers, switches and gateways. it is network layer protocol. it is physical and data link layer protocol. it is proprietary protocol. |