Author: CCNA Exam Answers

1. Which two traffic types require delay sensitive delivery? (Choose two.) email web FТР voice video 2. A network technician suspects that a particular network connection between two Cisco switches is having a duplex mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port? show interfaces  show running-config show ip interface brief show mac-address-table 3. Which statement is true about CDP on a Cisco device?​ The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity. To disable CDP globally,…

Read More

1. What three configuration steps must be performed to implement SSH access to a router? (Choose three.) a password on the console line an IP domain name a user account an enable mode password a unique hostname an encrypted password 2. What is the objective of a network reconnaissance attack? discovery and mapping of systems unauthorized manipulation of data disabling network systems or services denying access to resources by legitimate users 3. For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which settings can accomplish this task? smartcard settings firewall settings MAC address…

Read More

1. On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network? a dedicated file server a home router an ISP DHCP server a DNS server 2. What part of the URL, ht​tp://ww​w.cisco.com/index.html, represents the top-level DNS domain? .com www http index 3. What are two characteristics of the application layer of the TCP/IP model? (Choose two.) responsibility for logical addressing responsibility for physical addressing the creation and maintenance of dialogue between source and destination applications closest to the end user the establishing of window size 4. What message type is…

Read More

1. Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination. What is one way that the TCP protocol addresses this? The source decreases the amount of data that it transmits before it receives an acknowledgement from the destination. The source decreases the window size to decrease the rate of transmission from the destination. The destination decreases the window size. The destination sends fewer acknowledgement messages in order to conserve bandwidth. 2. Which two operations are provided by TCP but not by UDP? (Choose two.) identifying the applications acknowledging received…

Read More

1. What is a function of the tracert command that differs from the ping command when they are used on a workstation? The tracert command reaches the destination faster. The tracert command shows the information of routers in the path. The tracert command sends one ICMP message to each hop in the path. The tracert command is used to test the connectivity between two devices. 2. Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts? redirect ping time exceeded destination unreachable 3. Which two things can be determined by using the ping command? (Choose two.)…

Read More

Enterprise Networking, Security, and Automation ( Version 7.00) – ENSA Practice PT Skills Assessment (PTSA) Answers ENSA Practice PT Skills Assessment (PTSA) A few things to keep in mind while completing this activity: Do not use the browser Back button or close or reload any exam windows during the exam. Do not close Packet Tracer when you are done. It will close automatically. Click the Submit Assessment button in the browser window to submit your work. Topology Addressing Table Device Name G0/0/0 10.10.1.17/29 BD-1 G0/0/0 10.10.1.17/29 S0/1/0 10.10.0.237/30 S0/1/1 192.0.2.113/29 BD-2 G0/0/0 192.168.11.1/24 G0/0/1 10.10.1.18/29 BD-3 G0/0/0 192.168.22.1/24 G0/0/1 10.10.1.19/29…

Read More

1. What is the subnet address for the IPv6 address 2001:D12:AA04:B5::1/64? 2001::/64 2001:D12::/64 2001:D12:AA04::/64 2001:D12:AA04:B5::/64 2. Which type of IPv6 address is not routable and used only for communication on a single subnet? global unicast address link-local address loopback address unique local address unspecified address 3. Which address type is not supported in IPv6? private multicast unicast broadcast 4. What is the minimum configuration for a router interface that is participating in IPv6 routing? to have only a link-local IPv6 address to have both an IPv4 and an IPv6 address to have a self-generated loopback address to have both a…

Read More

1. What does the IP address 172.17.4.250/24 represent? network address multicast address host address broadcast address 2. If a network device has a mask of /28, how many IP addresses are available for hosts on this network? 256 254 62 32 16 14 3. What is the purpose of the subnet mask in conjunction with an IP address? to uniquely identify a host on a network to identify whether the address is public or private to determine the subnet to which the host belongs to mask the IP address to outsiders 4. A network administrator is variably subnetting a network.…

Read More

1. What is the purpose of the banner motd command? It configures a message that will identify printed documents to LAN users. It is a way that routers communicate the status of their links with oneanother. It provides an easy way of communicating with any user attached to a router’s LANs. It provides a way to make announcements to those who log in to a router. 2. A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered…

Read More

1. Which destination address is used in an ARP request frame? 0.0.0.0 255.255.255.255 FFFF.FFFF.FFFF 127.0.0.1 01-00-5E-00-AA-23 2. What addresses are mapped by ARP? destination MAC address to a destination IPv4 address destination IPv4 address to the source MAC address destination IPv4 address to the destination host name destination MAC address to the source IPv4 address 3. What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table? It initiates an ARP request. It broadcasts the frame out of all ports on the switch. It notifies the sending host that…

Read More

1. Which command can be used on a Windows host to display the routing table? netstat -s show ip route netstat -r tracert 2. What information is added during encapsulation at OSI Layer 3? source and destination MAC source and destination application protocol source and destination port number source and destination IP address 3. How does the network layer use the MTU value? The network layer depends on the higher level layers to determine the MTU. The network layer depends on the data link layer to set the MTU, and adjusts the speed of transmission to accommodate it. The MTU…

Read More