Nuevo ccna
![]() |
![]() |
![]() |
Título del Test:![]() Nuevo ccna Descripción: EXAMEN CCNA |




Comentarios |
---|
NO HAY REGISTROS |
Refer to the exhibit. Which two statements about router R1 are true?. At least three IGP routing protocols are running on the router. At least two IGP routing protocols are running on the router. The router has two EIGRP neighbors and one OSPF neighbor. The router has an OSPF Area 0 adjacency with the device at 10.82.4.42. The router is learning external OSPF and EIGRP routes. Which plane handles switching traffic through a Cisco router?. data. performance. control. management. Which command must you enter to enable OSPFV2 in an IPV4 network?. ip ospf hello-interval seconds. router ospfv2 process-id. router ospf value. router ospf process-id. Which command should you enter to configure a single port to bypass the spanning-tree Forward and Delay timers?. spanning-tree portfast bpdufilter default. spanning-tree portfast. spanning-tree portfast default. spanning-tree portfast bpduguard default. Which two options are fields in an Ethernet frame?(choose two). frame check sequence. header. source IP address. destination IP address. type. Which two technologies can combine multiple physical switches into one logical switch? (Choose two.). GLBP. HSRP. VRRP. VSS. StackWise. Which two tasks can help you gather relevant facts when you troubleshoot a network problem? (Choose two.). Collect technical data from network management system and logging servers. Ask question of the users who are effected by the problem. Eliminate known issues first. Define the problem in temrs of symtoms and causes. Change one setting or component and then analyze the result. Which command should you use to display detailed information about EBGP peers?. show ip bgp paths. show ip bgp neighbors. show ip bgp. show ip bgp summary. Which are two common types of copper cable? (Choose two). Unshielded twisted pair. Single-mode. OM4. Shieled twisted pair. Multimode. Which port status does the interface enter when UDLD detects a unidirectional link?. Errdisable. Down/down. Up/up. Shutdown. Refer to the exhibit. How will switch SW2 handle traffic from VLAN 10 on SW1?. It drops the traffic. It sends the traffic to VLAN 10. It sends the traffic to VLAN 1. It sends the traffic to VLAN 100. Refer to the exhibit. How will switch SW2 handle traffic from VLAN 10 on SW1?. VLAN 1. VLAN 5. VLAN 10. VLAN 20. Which type of frame is larger than 9000 bytes?. Baby giant. Runt. Giant. Jumbo. Which command should you enter to configure an LLDP delay of 5 seconds?. lldp reinit 5. lldp reinit 5000. lldp holdtime 5. lldp timer 5000. Which command must you use to test DNS connectivity?. Show interfaces. Show hosts. Ipconfig. telnet. Which effect does the switchport trunk native vlan 10 command have?. It configures the interface as a trunk port. It sets VLAN 10 as the native VLAN on the trunk. It prevents traffic on VLAN 1 from passing on the trunk. It allows traffic from native VLAN 10 on the trunk. Which two TCP messages use a 32-bit number as part of the initial TCP handshake? (Choose two.). ACK. RST. SYN. SYN-ACK. FIN. How does a Cisco IP phone handle untagged traffic that it receives from an attached PC?. It allows the traffic to pass through unchanged. It tags the traffic with the native VLAN. It tags the traffic with the default VLAN. It tags the traffic with the default VLAN. Which feature or protocol determines whether the QoS on the network is sufficient to support IP services?. LLDP. IP SLA. CDP. EEM. Which feature or protocol must you enable so that the output of the show interface trunk command include information about native VLAN mismatch?. CDP. RSTP. DTP. PortFast. Which two types of NAT addresses are used in a Cisco NAT device? (Choose two.). inside local. inside global. inside private. outside private. external global. external local. Refer to the exhibit. What is the effect of the configuration?. Traffic from PC A is dropped when it uses the trunk to communicate with PC B. Traffic from PC A is sent untagged when it uses the trunk to communicate with PC B. Traffic from PC B is dropped when it uses the trunk to communicate with PC A. Traffic from PC B is sent untagged when it uses the trunk to communicate with PCA. Which task should you perform before you use the APIC-EM Path Trace tool to perform ACL analysis?. Verify that DNS is configured on the controller. Execute a standard traceroute to the destination. Verify that the devices of interest are included in the device inventory. Configure the IP address from which to generate the trace. Which protocols does the internet layer in the TCP/IP model encapsulate? (Choose two.). TCP. ICMP. DNS. ARP. SMTP. Which two pins does an RJ-45 connector use to transmit data? (Choose two.). 1. 2. 3. 4. 6. Which IOS troubleshooting tool should you use to direct system messages to your screen?. Log events. APIC-EM. Terminal monitor. Local SPAN. Which two VLAN IDs indicate a default VLAN? (Choose two.). 0. 1. 1005. 1006. 4096. You notice that packets that are sent from a local host to a well-known service on TCP port 80 of a remote host are sometimes lost. You suspect an ACL issue. Which two APIC-EM Path Trace ACL-analysis options should you use to troubleshoot the problem? (Choose two.). Destination port. Debug. Performance Protocol. QoS. Protocol. Refer to the exhibit. When PC1 sends a packet to PC2, the packet has which source and destination IP addresses when it arrives at interface Gi0/0 on router R2?. Source 192.168.20.10 and destination 192.168.20.1. Source 192.168.10.10 and destination 192.168.20.10. Source 10.10.1.1 and destination 10.10.2.2. Source 192.168.10.10 and destination 10.10.10.2. According to security best practices, which two actions must you take to protect an unused switch port? (Choose two.). Configure the port as an access port on a VLAN other than VLAN 1. Configure the port as a trunk port. Enable CDP. Configure the port to automatically come online. Administratively shut down the port. Which two statements correctly describe distance-vector routing protocols? ( Choose two.). they specify the next hop toward the destination subnet. they require quick network convergence to support normal operations. they generate a complete topology of the network. they update other devices on the network when one device detects a topology change. they use variety of metrics to identify the distance to a destination network. In which three ways is an IPv6 header simpler than an IPv4 header? (Choose three). Unlike IPv4 headers, IPv6 headers have a fixed length. IPv6 uses an extension header instead of the IPv4 Fragmentation field. IPv6 headers eliminate the IPv4 Checksum field. IPv6 headers use the Fragment Offset field in place of the IPv4 Fragmentation field. IPv6 headers use a smaller Option field size than IPv4 headers. IPv6 headers use a 4-bit TTL field, and IPv4 headers use an 8-bit TTL field. Which two statements about exterior routing protocols are true? (Choose two.). BGP is the current standard exterior routing protocol. Most modern networking supports both EGP and BGP for external routing. Most modern networking supports both EGP and EIGRP for external routing. They determine the optimal path between autonomous systems. They determine the optimal path within an autonomous system. Which two actions must you take to correctly configure PPPoE on a client? (Choose two.). Create a BBA group and link it to the dialer interface. Define a dialer interface. Define a virtual template interface. Create a dialer pool and bind it to the physical interface. Create a dialer pool and bind it to the virtual template. Which two statements about MPLS are true? (Choose two). It provides automatic authentication. It can carry multiple protocols, including IPv4 and IPv6. It encapsulates all traffic in an IPv4 header. It uses labels to separate and foward customer traffic. It tags customer traffic using 802.1q. Frame flooding can occur in which circumstance?. The destination IP address is missing from the route table. The source IP address is missing from the route table. The destination MAC address is missing from the CAM table. The source MAC address is missing from the CAM table. Which three circumstances can cause a GRE tunnel to be in an up/down state? (Choose three.). The tunnel interface IP address is misconfigured. The tunnel interface is down. A valid route to the destination address is missing from the routing table. The tunnel address is routed through the tunnel itself. The ISP is blocking the traffic. An ACL is blocking the outbound traffic. Which command should you enter to view the error log in an EIGRP for Ipv6 enviroment?. Show ipv6 eigrp neighbors. Show ipv6 eigrp traffic. Show ipv6 eigrp topology. Show ipv6 eigrp events. Which add prefix does OSPFv3 use when multiple IPv6 address are configured on a single interface?. all prefix on the interface. the prefix that the administrator configure for OSPFv3 use. the lowest prefix on the interface. the highest prefix on the interface. Which function does traffic shaping perform?. It buffers and queues excess packets. It buffers traffic without queuing it. It queues traffic without buffering it. It drops packets to control the output rate. Which two statements about RFC 1918 addresses are true? (Choose two.). They require Network Address Translation or Port Address Translation to access the Internet. They have reserved address space for Class A and Class B networks only. They must be registered. They provide security to end users when the users access the Internet. They increase network performance. Which two statements about RFC 1918 addresses are true? (Choose two.). They require Network Address Translation or Port Address Translation to access the Internet. They have reserved address space for Class A and Class B networks only. They must be registered. They provide security to end users when the users access the Internet. They increase network performance. Which command can you use to test whether a switch supports secure connections and strong authentication?. Router#ssh –v 1 –l admin 10.1.1.1. Switch>ssh –v 1 –l admin 10.1.1.1. Switch#ssh –l admin 10.1.1.1. Router>ssh –v 2 –l admin10.1.1.1. Which feature or protocol is required for an IP SLA to measure UDP jitter?. CDP. LLDP. EEM. NTP. Refer to the exhibit. If all routers on this network run RIPv2, Which two configurations can you apply to router R3 to produce this routing table? (Choose two.). router rip version 2 network 192.168.4.0 network 192.168.23.0. router rip version 2 network 192.168.3.0 network 192.168.4.0 network 192.168.23.0 passive-interface default. router rip version 2 network 192.168.3.0 network 192.168.4.0. router rip version 2 network 192.168.3.0 network 192.168.4.0 network 192.168.23.0. router rip version 2network 192.168.3.0 network 192.168.23.0. Refer to the exhibit. The network administrator must establish a route by which London workstations can forward traffic to the Manchester workstations. What is the simplest way to accomplish this?. Configure a dynamic routing protocol on London to advertise all routes to Manchester. Configure a dynamic routing protocol on London to advertise summarized routes to Manchester. Configure a dynamic routing protocol on Manchester to advertise a default route to the London router. Configure a static default route on London with a next hop of 10.1.1.1. Configure a static route on London to direct all traffic destined for 172.16.0.0/22 to 10.1.1.2. Configure Manchester to advertise a static default route to London. Which two statements about static routing are true? (Choose two.). It provides only limited security unless the administrator performs additional configuration. It allows packets to transit a different path if the topology changes. Its initial implementation is more complex than OSPF. Its default administrative distance is lower than EIGRP. It allows the administrator to determine the entire path of a packet. Which three options are types of Layer 2 network attack? (Choose three). Spoofing attacks. Vlan Hopping. botnet attacks. DDOS attacks. ARP Attacks. Brute force attacks. A BPDU guard is configured on an interface that has PortFast enabled. Which state does the interface enter when it receives a BPDU?. Blocking. Shutdown. Listening. Errdisable. Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three). Session. transport. presentation. application. data-link. network. Refer to the exhibit. If the router attempts to send a frame out of the interface, but the carrier is busy, which counter will increment?. Collisions. Late collision. Deferred. Lost carrier. Which two statements about NTP operation are true? (Choose two.). Cisco routers can act only as NTP clients. Cisco routers can act as both NTP authoritative servers and NTP clients. NTP uses UDP over IP. NTP uses TCP over IP. Cisco routers can act only as NTP server. Which two pieces of information can you learn by viewing the routing table? (Choose two.). whether a route was tagged. the interface on which traffic is sent. whether access lists are blocking incoming routes. whether routes were summarized. whether a route was learned via IGP or EGP. Which port security violation mode drop traffic from unknown MAC addresses and sends an SNMP trap?. Protect. Resrict. Shutdown. Shutdown VLAN. Which two options are primary responsibilities of the APlC-EM controller? (Choose two.). lt automates network actions between different device types. lt provides robust asset management. lt tracks license usage and Cisco lOS versions. lt automates network actions between legacy equipment. lt makes network functions programmable. QUESTION 55 Which component of an Ethernet frame is used to notify a host that traffic is coming?. Type. Preamable. Start of frame delimiter. Data field. Which address class includes network 191.168.0.1/27?. Class C. Class B. Class D. Class A. What is the default Syslog facility level?. local4. local5. local6. local7. What is the easiest way to verify the Layer 3 path from a router to host 192.168.2.1?. Execute a traceroute form the router to host 192.168.2.1. Add a static route for host 192.168.2.1 to the routing table of the router. Use Telnet to connect the router to host 192.168.2.1. Execute a ping form the router to host 192.168.2.1. Which Layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-in security mechanisms?. HDLC. PPP. X.25. Frame Relay. Which command must you enter to guarantee that an HSRP router with higher priority becomes the HSRP primary router after it is reloaded?. standby 10 priority 150. standby 10 preempt. standby 10 version 2. standby 10 version 1. Which command can you enter to display duplicate IP addresses that the DHCP server assigns?. show ip dhcp conflict 10.0.2.12. show ip dhcp database 10.0.2.12. show ip dhcp server statistics. show ip dhcp binding 10.0.2.12. Which two server types are used to support DNS lookup? (Choose two.). web server. ESX host. authoritative name server. file transfer server. name resolver. Which two statements about TACACS+ are true? (Choose two.). lt can run on a UNlX server. lt authenticates against the user database on the local device. lt is more secure than AAA authentication. lt is enabled on Cisco routers by default. lt uses a managed database. Which cloud service that usually provides software beyond the basic operating system is normally used for development?. Platform-as-a-service. Database-as-a-service. Infrastructure-as-a-service. Software-as-a-service. Which two statements describe key differences between single- and dual-homed WAN connections? (Choose two). Dual-homed WAN connections are more expensive than single-homed connections. Dual-homed WAN connections have more management-application overhead than single-homed connections. Dual-homed WAN connections require more skill to administer than single-homed connections. Dual-homed WAN connections have a simpler topology than single-homed connections. Dual-homed WAN connections have higher WAN speed than single- homed connections. Which two pieces of information about a Cisco device can Cisco Discovery Protocol communicate? (Choose two.). The spanning-tree priority. The spanning-tree protocol. The native VLAN. The VTP domain. The trunking protocol. Which keyboard shortcut can you use to exit the System Configuration Dialog on a Cisco networking device and return to privileged EXEC mode without making changes?. Shift – Esc. Ctrl-V. Ctrl-C. Ctrl-Alt-Delete. After you configure a DHCP server on VLAN 10 to service clients on VLAN 10 and VLAN 20, clients on VLAN 10 are given IP address assignments, but clients on VLAN 20 fail to receive IP addresses. Which action must you take to correct the problem?. Configure the default gateway in the DHCP server configuration. Configure a separate DHCP server on VLAN 20. Configure the DNS name option in the DHCP server configuration. Configure the ip helper-address command in the DHCP server configuration. Which two benefits can you get by stacking Cisco switches?(choose two). Each switch in the stack handles the MAC table independently from the others. You can add or remove switches without taking the stack down. Each switch in the stack can use a different IOS image. The stack enables any active member to take over as the master switch if the existing master fails. You can license the entire stack with a single master license. Refer to the exhibit. Which two statements about the network enviroment of router R1 must be true? (Choose two). A static default route to 10.85.33.14 was defined. There are 20 different network masks within the 10.0.0.0/8 network. Ten routes are equally load-balanced between Te0/1/0.100 and Te0/2/0.100. The 10.0.0.0/8 network was learned via external EIGRP. The EIGRP administrative distance was manually changed from 90 to 170. Which NAT function can map multiple inside addresses to a single outside address?. PAT. SFTP. RARP. ARP. TFTP. interface Loopback0 ip address 172.16.1.33 255.255.255.224 router bgp 999 neighbor 10.1.5.2 remote-as 65001 Refer to the exhibit . Which Command do you enter so that R1 advertises the loopback0 interface to the BGP Peers?. Network 172.16.1.32 mask 255.255.255.224. Network 172.16.1.0 0.0.0.255. Network 172.16.1.32 255.255.255.224. Network 172.16.1.33 mask 255.255.255.224. Network 172.16.1.32 mask 0.0.0.31. Network 172.16.1.32 0.0.0.31. Refer to the exhibit. Which statement about the interface that generated the output is true?. one secure MAC address is dynamically learned on the intertace. a syslog message is generated when a violation occurs. five secure MAC addresses are dynamically learned on the interface. one secure MAC address is manually configured on the interface. Which two conditions can be used to elect the spanning-tree root bridge?(choose two). the highest MAC address. the lowest MAC address. the highest port priority. the lowest system ID. the lowest switch priority. Which definition of default route is true?. A route that is manually configured. A route used when a destination route is missing. A route to the exact /32 destination address. Dynamic route learned from the server. Which type of device should you use to preserve IP addresses on your network?. firewall. WLAN controller. load balancer. intrusion prevention device. Refer to the exhibit. Users in your office complaining that they cannot connect to the servers at a remote site. When troubleshooting, you find that you can successfully reach the servers from router R2. What is the most likely reason that the other users are experiencing connection failure?. Interface ports are shut down on the remote servers. The DHCP address pool has been exhausted. VLSM is missconfigured between the router interface and the DHCP Pool. The ip helper-address command is missing on the R2 interface that connects to the switch. Which network appliance checks the state of a packet to determine whether the packet is legitimate?. The LAN controller. The firewall. The Layer 2 switch. The load balancer. You apply a new inbound access list to routers, blocking UDP packets to the HSRP group. Which two effectsdoes this action have on the HSRP group process? (Choose two.). HSRP redundancy works as expected. Both the active and standby routers become active. The active router immediately becomes the standby router. HSRP redundancy fails. The routers in the group generate duplicate IP address warnings. Which feature can cause a port to shut down immediately after a switch reboot?. COPP. PortFast. DTP. port security. What happens to new traffic that is sent to a destination MAC address after the MAC aging time expires?. It is dropped. It is flooded. It is queued. It is process-switched. Which two command sequences must you configure on a switch to establish a Layer 3 EtherChannel with an open-standard protocol? (choose two). interface GigabitEthernet0/0/1 channel-group 10 mode on. interface port-channel 10 switchport switchport mode trunk. interface port-channel 10 no switchport ip address 172.16.0.1 255.255.255.0. interface GigabitEthernet0/0/1 channel-group 10 mode auto. interface GigabitEthernet0/0/1 channel-group 10 mode active. Which two statements about IPv4 multicast traffic are true? (Choose two.). It burdens the source host without affecting remote hosts. It uses a minimum amount of network bandwidth. It is bandwidth-intensive. It simultaneously delivers multiple streams of data. It is the most efficient way to deliver data to multiple receivers. Which command can you enter on a switch to display the IP addresses associated with connected devices?. Show cdp neighbors detail. Show cdp neighbor. Show cdp interface. Show cdp traffic. Which two tasks should you perform to begin troubleshooting a network problem? (Choose two.). Analyze the results. Implement an action plan. Define the problem as a set of symptoms and causes. Gather all the facts. Monitor and verify the resolution. Which IPv6 address is the all-router multicast group?. FF02::1. FF02::2. FF02::3. FF02::4. Which three statements about HSRP operation are true? (Choose three.)?. The virtual IP address and virtual MAC+K44C address are active on the HSRP Master router. The HSRP default timers are a 3 second hello interval and a 10 second dead interval. HSRP supports only clear-text authentication. The HSRP virtual IP address must be on a different subnet than the routers’ interfaces on the same LAN. The HSRP virtual IP address must be the same as one of the router’s interface addresses on the LAN. HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing. Which protocol does ipv6 use to discover other ipv6 nodes on the same segment?. CLNS. TCPv6. NHRP. NDP. ARP. Which value is used to build the CAM table?. destination IP address. source IP address. destination MAC address. source MAC address. How does a router handle an incoming packet whose destination network is missing from the routing table?. it broadcast the packet to each interface on the router. it discards the packet. it broadcasts the packet to each network on the router. it routes the packet to the default route. Refer to the exhibit. The server on this network is configured with an MTU of 9216, and the two interfaces on router R1 and configured for MTUs of 2000 and 3000, as shown. What is the largest packet size that can pass between the workstation and the server?. 1500 bytes. 2000 bytes. 3000 bytes. 9216 bytes. A national retail chain needs to design an IP addressing scheme to support a nationwide network. The company needs a minimum of 300 sub-networks and a maximum of 50 host addresses per subnet. Working with only one Class B address, which of the following subnet masks will support an appropriate addressing scheme? (Choose two.). 255.255.255.0. 255.255.255.128. 255.255.252.0. 255.255.255.224. 255.255.255.192. 255.255.248.0. Which two statements correctly describe the ping utility? (Choose two.). It uses UDP. It can identify the source of an ICMP “time exceeded” message. It uses ICMP. It can identify the path that a packet takes to a remote device. It can verify connectivity to a remote device without identifying the path. Refer to the exhibit. The following commands are executed on interface fa0/1 of 2950Switch. 2950Switch(config-if)# switchport port-security 2950Switch(config-if)# switchport port-security mac-address sticky 2950Switch(config-if)# switchport port-security maximum 1 The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950Switch? (Choose two.). The MAC address table will now have an additional entry of fa0/1 FFFF.FFFF.FFFF. Only host A will be allowed to transmit frames on fa0/1. This frame will be discarded when it is received by 2950Switch. All frames arriving on 2950Switch with a destination of 0000.00aa.aaaa will be forwarded out fa0/1. Hosts B and C may forward frames out fa0/1 but frames arriving from other switches will not be forwarded out fa0/1. Only frames from source 0000.00bb.bbbb, the first learned MAC address of 2950Switch, will be forwarded out fa0/1. Which two statements about stateful firewalls in an enterprise network are true?. They can use information about previous packets to make decisions about future packets. They are most effective when placed in front of the router connected to the Internet. they are more susceptible to DoS attacks than stateless firewalls. they can track the number of active TCP connections. They can filter HTTP and HTTPS traffic in the inbound direction only. Which three statements about IPv6 address fd14:920b:f83d:4079::/64 are true? (Choose two). The subnet ID is 14920bf83d. The subnet ID is 4079. The global ID is 14920bf83d. The address is a link-local address. The global ID is 4079. The address is a unique local address. Which two pieces of information can you determine from the output of the show ntp status command? (Choose two.). whether the clock is synchronized. the IP address of the peer to Which the clock is synchronized. the NTP version number of the peer. whether the NTP peer is statically configured. the configured NTP servers. Which QOS feature can drop traffic that exceeds the committed access rate?. weighted fair queuing. FIFO. policing. shaping. Which two address spaces are valid Class B IPv4 ranges that are non-routable to the Internet? (Choose two.). 10.0.0.0 through 10.0.255.255. 169.254.0.0 through 169.254.255.255. 172.16.0.0 through 172.31.255.255. 172.16.0.0 through 172.32.255.255. 192.168.0.0 through 192.168.255.255. Which two statements about the ip default-network command are true? (Choose two.). It specifies the network that is used when the device finds an exact match in the routing table. It requires IP routing to be disabled on the device. It specifies the network that is used when the device cannot find an exact match in the routing table. It requires IP routing to be enabled on the device. It can be configured on a Layer 2 switch to specify the next hop. Which command can you enter to determine whether serial interface 0/2/0 has been configured using HDLC encapsulation?. router#show platform. router#show interfaces Serial 0/2/0. router#show ip interface s0/2/0. router#show ip interface brief. |