Author: CCNA Exam Answers

1. Which sequence correctly identifies the order of the steps that a router will perform when it receives a packet on an Ethernet interface? 1. The router examines the destination MAC address. 2. The router identifies the Ethernet Type field. 3. The router de-encapsulates the Ethernet frame. 4. The router examines the destination IP address. 1. The router de-encapsulates the Ethernet frame. 2. The router examines the destination MAC address. 3. The router identifies the Ethernet Type field. 4. The router examines the destination IP address. 1. The router examines the destination IP address. 2. The router examines the destination…

Read More

1. A network administrator configures a router by the command ip route 0.0.0.0 0.0.0.0 209.165.200.226. What is the purpose of this command? to forward all packets to the device with IP address 209.165.200.226 to forward packets destined for the network 0.0.0.0 to the device with IP address 209.165.200.226 to provide a route to forward packets for which there is no route in the routing table to add a dynamic route for the destination network 0.0.0.0 to the routing table 2. Which type of static route that is configured on a router uses only the exit interface? fully specified static route…

Read More

1. Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route? next-hop gateway of last resort outgoing interface route source 2. Which three advantages are provided by static routing? (Choose three.) Static routing does no advertise over the network, thus providing better security. No intervention is required to maintain changing route information. Static routes scale well as the network grows. The path a static route uses to send data is known. Configuration of static routes is error-free. Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does.…

Read More

1. A user is configuring a wireless access point and wants to prevent any neighbors from discovering the network. What action does the user need to take? Configure DMZ settings. Configure a DNS server. Disable SSID broadcast. Enable WPA encryption. 2. When a wireless network in a small office is being set up, which type of IP addressing is typically used on the networked devices? network public wireless private 3. A user has just purchased a generic home router and would like to secure it. What should be done to help secure the wireless home router? Change the default SSID.…

Read More

1. In the context of mobile devices, what does the term tethering involve? connecting a mobile device to a USB port on a computer in order to charge the mobile device connecting a mobile device to another mobile device or computer to share a network connection connecting a mobile device to a 4G cellular network connecting a mobile device to a hands-free headset 2. Which feature of 802.11n wireless access points allows them to transmit data at faster speeds than previous versions of 802.11 Wi-Fi standards did? SPS WPS MITM MIMO 3. Which method of wireless authentication is currently considered…

Read More

1. What is a recommended best practice when dealing with the native VLAN? Use port security. Turn off DTP. Assign it to an unused VLAN. Assign the same VLAN number as the management VLAN. 2. On what switch ports should PortFast be enabled to enhance STP stability? only ports that are elected as designated ports all trunk ports that are not root ports all end-user ports only ports that attach to a neighboring switch 3. Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco? switchport…

Read More

1. What two protocols are supported on Cisco devices for AAA communications? (Choose two.) RADIUS LLDP HSRP VTP TACACS+ 2. Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack? HTTP LLDP CDP FTP 3. When security is a concern, which OSI Layer is considered to be the weakest link in a network system?​ Layer 4 Layer 7 Layer 2 Layer 3 4. Which Layer 2 attack will result in a switch flooding incoming frames to all ports? MAC address overflow Spanning Tree Protocol…

Read More

1. What is the purpose of HSRP? It prevents a rogue switch from becoming the STP root. It provides a continuous network connection when a router fails. It enables an access port to immediately transition to the forwarding state. It prevents malicious hosts from connecting to trunk ports. 2. Which nonproprietary protocol provides router redundancy for a group of routers which support IPv4 LANs? SLB HSRP VRRPv2 GLBP 3. A network administrator is analyzing first-hop router redundancy protocols. What is a characteristic of VRRPv3? It works together with HSRP. It allows load balancing between routers. VRRPv3 is Cisco proprietary. It…

Read More

1. How does an IPv6 client ensure that it has a unique address after it configures its IPv6 address using the SLAAC allocation method? It contacts the DHCPv6 server via a special formed ICMPv6 message. It checks with the IPv6 address database that is hosted by the SLAAC server. It sends an ARP message with the IPv6 address as the destination IPv6 address. It sends an ICMPv6 Neighbor Solicitation message with the IPv6 address as the target IPv6 address. 2. Which method would an IPv6-enabled host using SLAAC employ to learn the address of the default gateway? neighbor advertisements that…

Read More

1. A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.) DHCPNAK DHCPREQUEST DHCPOFFER DHCPACK DHCPDISCOVER 2. An administrator issues the commands: Router(config)# interface g0/1 Router(config-if)# ip address dhcp What is the administrator trying to achieve? configuring the router to act as a DHCPv4 server configuring the router to act as a relay agent configuring the router to resolve IP address conflicts configuring the router to obtain IP parameters from a DHCPv4 server 3. When a client is requesting an initial address lease from…

Read More

1. An EtherChannel link using LACP was formed between two switches, S1 and S2. While verifying the configuration, which mode combination could be utilized on both switches?​ S1-passive and S2-passive S1-on and S2-active S1-on and S2-passive S1-passive and S2-active 2. When a range of ports is being configured for EtherChannel, which mode will configure PAgP so that it initiates the EtherChannel negotiation? active desirable passive auto 3. Which three interface parameters must match for an EtherChannel to form? (Choose three.) PortFast mode spanning-tree state allowed VLANs native VLAN EtherChannel mode trunking mode 4. What are three advantages of using EtherChannel…

Read More

1. Which port state will switch ports immediately transition to when configured for PortFast? forwarding blocking listening learning 2. After the election of the root bridge has been completed, how will switches find the best paths to the root bridge? Each switch will analyze the port states of all neighbors and use the designated ports to forward traffic to the root. Each switch will analyze the sum of all port costs to reach the root and use the path with the lowest cost. Each switch will analyze the sum of the hops to reach the root and use the path…

Read More