Author: CCNA Exam Answers

[alert-announce]How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.[/alert-announce][alert-note]NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.[/alert-note] Enterprise Networking, Security, and Automation ( Version 7.00) – CCNA (200-301) Certification Practice Exam 1. An instructor is reviewing student answers on a previous term exam…

Read More

1. A company uses a cloud-based payroll system. Which cloud computing technology is this company using? infrastructure as a service (IaaS) wireless as a service (WaaS) software as a service (SaaS) browser as a service (BaaS) 2. For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model? There is more data traffic flowing from virtual servers to clients. Data traffic from clients will be routed to multiple virtual servers. There are significant data exchanges between virtual servers. More network control traffic is generated between virtual servers and clients. 3. Which…

Read More

1. Which statement describes the physical topology for a LAN? It depicts the addressing scheme that is employed in the LAN. It describes whether the LAN is a broadcast or token-passing network. It defines how hosts and network devices connect to the LAN. It shows the order in which hosts access the network. 2. A network engineer is troubleshooting a network problem where users cannot access the FTP server at the same IP address where a website can be successfully accessed. Which troubleshooting method would be the best to apply in this case? comparing IP settings on user workstations top-down…

Read More

1. Which cost-effective physical network topology design is recommended when building a three-tier campus network that connects three buildings?‚Äč mesh dual ring extended star bus 2. How much traffic is a 48-port gigabit switch capable of switching when operating at full wire speed? 48 Gb/s, by providing full bandwidth to each port 1 Gb/s, because data can only be forwarded from one port at a time 44 Gb/s, due to overhead requirements 24 Gb/s, because this is the maximum forwarding rate on Cisco switches 3. What is the term that is used for the area of a network that is…

Read More

1. What are two reasons for an administrator to issue the copy running-config tftp command on a switch or router? (Choose two.) to force an automatic reload of the device to have a backup of the running configuration file in the router to overwrite the current configuration to transfer the current configuration file to a server to save the running configuration file to a remote location 2. What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command? the platform that is used by the…

Read More

1. What is the term used to indicate a variation of delay? speed mismatch serialization delay jitter latency 2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value? jitter bandwidth priority latency 3. What role do network devices play in the IntServ QoS model? Network devices provide a best-effort approach to forwarding traffic. Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.…

Read More

1. A company is expanding its business to other countries. All branch offices must remain connected to corporate headquarters at all times. Which network technology is required to support this scenario? LAN WLAN MAN WAN 2. What is the recommended technology to use over a public WAN infrastructure when a branch office is connected to the corporate site? VPN ATM municipal Wi-Fi ISDN 3. Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM? satellite copper fiber optic Wi-Fi 4. Which statement describes a characteristic of a WAN? WAN networks are owned by…

Read More

1. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.) NAT adds authentication capability to IPv4. NAT introduces problems for some applications that require end-to-end connectivity. NAT provides a solution to slow down the IPv4 address depletion. NAT causes routing tables to include more information. NAT improves packet handling. NAT will impact negatively on switch performance. 2. A network administrator wants to examine the active NAT translations on a border router. Which command would perform the task? Router# clear ip nat translations Router# show ip nat translations Router# debug…

Read More

1. The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.) access-class 5 in access-list standard VTY permit 10.7.0.0 0.0.0.127 access-list 5 permit 10.7.0.0 0.0.0.31 ip access-group 5 in ip access-group 5 out access-list 5 deny any 2. Consider the configured access list. R1# show access-lists extended IP access list 100 deny tcp host 10.1.1.2 host 10.1.1.1 eq telnet deny…

Read More

1. Which two conditions would cause a router to drop a packet? (Choose two.) The ACL that is affecting the packet does not contain at least one deny ACE. No routing table entry exists for the packet destination, but the packet matches a permitted address in an outbound ACL. No outbound ACL exists on the interface where the packet exits the router. No inbound ACL exists on the interface where the packet enters the router. The packet source address does not match the source as permitted in a standard inbound ACE. 2. A network administrator configures an ACL with the…

Read More

1. Which criterion is preferred by the router to choose a router ID? the IP address of the highest configured loopback interface on the router the IP address of the highest active OSPF-enabled interface the router-id rid command the IP address of the highest active interface on the router 2. Which wildcard mask would be used to advertise the 192.168.5.96/27 network as part of an OSPF configuration? 0.0.0.32 0.0.0.31 255.255.255.224 255.255.255.223 3. The following three networks are directly connected to an OSPF router; 192.168.0.0/24, 192.168.1.0/24, and 192.168.2.0/24. Which OSPF network command would advertise only the 192.168.1.0 network to neighbors? router(config-router)#…

Read More

1. What is a function of OSPF hello packets? to discover neighbors and build adjacencies between them to ensure database synchronization between routers to send specifically requested link-state records to request specific link-state records from neighbor routers 2. Which OPSF packet contains the different types of link-state advertisements? LSU LSR hello DBD LSAck 3. Which three statements describe features of the OSPF topology table? (Choose three.) After convergence, the table only contains the lowest cost route entries for all known networks. The topology table contains feasible successor routes. The table can be viewed via the show ip ospf database command.…

Read More