1. A PC is to access a web server on another network. Which inter-VLAN method will provide the highest bandwidth at Layer 3 and also provide a default gateway for the PC? multilayer switch with routing enabled router on a stick trunked interface between the router and the switch multiple physical interfaces on the router, all connected to a Layer 2 switch 2. Which scalable method must be implemented in order to provide inter-VLAN routing on a switched network with more than 1000 VLANs? routing traffic internally to a Layer 3 switch device configuring static routes on a Layer 2…
Author: CCNA Exam Answers
1. What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch? The port creates the VLAN again. The port goes back to the default VLAN. The port automatically associates itself with the native VLAN. The port becomes inactive. 2. In which memory location are the VLAN configurations of normal range VLANs stored on a Catalyst switch? flash ROM RAM NVRAM 3. An administrator is investigating a failure on a trunk link between a Cisco switch and a switch from another vendor. After a few show commands, the administrator notices that…
1. Which statement is true about broadcast and collision domains? The size of the collision domain can be reduced by adding hubs to a network. Adding a switch to a network will increase the size of the broadcast domain. Adding a router to a network will increase the size of the collision domain. The more interfaces a router has the larger the resulting broadcast domain. 2. What is one function of a Layer 2 switch? forwards data based on logical addressing determines which interface is used to forward a frame based on the destination MAC address duplicates the electrical signal…
1. Which tasks can be accomplished by using the command history feature? (Choose two.) Set the command history buffer size. Recall previously entered commands. View a list of commands entered in a previous session. Recall up to 15 command lines by default. Save command lines in a log file for future reference. 2. Which statement describes the system LED operation on Cisco Catalyst switches? If the LED is amber, the system is not powered on. If the LED is blinking amber, the switch is performing POST. If the LED is blinking green, the system is operating normally. If the LED…
1. What is JSON? It is a data format for storing and transporting data. It is a scripting language. It is a database. It is a compiled programming language. 2. What is an architectural constraint to which a true RESTful API web service must adhere? It must support the XML data format. It operates as a cloud service. It runs as client/server model. It uses HTTPS to transport data. 3. In the RESTful API request example, http://www.mapquestapi.com/directions/v2/route?outFormat=json&key=KEY&from=San+Jose,Ca&to=Monterey,Ca, which term describes the component directions/v2/route? parameters resources API server query 4. Which statement describes an API? It is a set of functions…
1. Which two statements describe a remote access VPN? (Choose two.) It connects entire networks to each other. It requires hosts to send TCP/IP traffic through a VPN gateway. It is used to connect individual hosts securely to a company network over the Internet. It may require VPN client software on hosts. It requires static configuration of the VPN tunnel. 2. The use of 3DES within the IPsec framework is an example of which of the five IPsec building blocks? Diffie-Hellman integrity authentication nonrepudiation confidentiality 3. Which type of VPN may require the Cisco VPN Client software? MPLS VPN site-to-site…
1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring? spyware phishing DDoS social engineering adware 2. What causes a buffer overflow? downloading and installing too many software updates at one time attempting to write more data to a memory location than that location can hold sending too much information to two or more interfaces of the same device, thereby causing dropped packets sending repeated connections such as Telnet to a particular device, thus denying other data sources…
CCNAv7 ITN Skills Assessment – ITN Final Skills Exam (Equipment) Exam Answers Topology Assessment Objectives Part 1: Develop an IP Addressing Scheme (20 points, 25 minutes) Part 2: Initialize and Reload Devices (10 points, 20 minutes) Part 3: Configure Device IP address and Security Settings (45 points, 35 minutes) Part 4: Test and Verify IPv4 and IPv6 End-to-End Connectivity (15 points, 20 minutes) Part 5: Use the IOS CLI to Gather Device Information (10 points, 10 minutes) Scenario In this Skills Assessment (SA) you will configure the devices in a small network. You must configure a router, switch and PCs…
CCNAv7 ENSA Skills Assessment – ENSA Final Skills Exam (Equipment) Exam Answers Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0/0 10.67.254.2 255.255.255.252 N/A G0/0/1 192.168.1.1 255.255.255.0 N/A Lo0 10.52.0.1 255.255.255.248 N/A R2 G0/0/0 10.67.254.1 255.255.255.252 N/A Lo0 209.165.201.1 255.255.255.224 N/A G0/0/1 10.67.1.1 255.255.255.0 N/A S1 VLAN 1 192.168.1.2 255.255.255.0 192.168.1.1 S2 VLAN 1 10.67.1.2 255.255.255.0 10.67.1.1 Assessment Objectives Part 1: Initialize, Reload and Configure Basic Device Settings (40 points, 40 minutes) Part 2: Configure and Single Area OSPFv2 (20 points, 10 minutes) Part 3: Optimize Single Area OSPFv2 (25 points, 20 minutes) Part 4: Configure…
Lab – Install Linux in a Virtual Machine and Explore the GUI (Instructor Version) Objectives Part 1: Prepare a Computer for Virtualization Part 2: Install a Linux OS on the Virtual Machine Part 3: Explore the GUI Background / Scenario Computing power and resources have increased tremendously over the last 10 years. A benefit of multi-core processors and large amounts of RAM is the ability to install multiple operating systems through the use of virtualization on a computer. With virtualization, one or more virtual computers can operate inside one physical computer. Virtual computers that run within physical computers are called…
Lab – Configure CDP, LLDP, and NTP (Instructor Version) Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 Loopback1 172.16.1.1 255.255.255.0 N/A G0/0/1 10.22.0.1 255.255.255.0 S1 SVI VLAN 1 10.22.0.2 255.255.255.0 10.22.0.1 S2 SVI VLAN 1 10.22.0.3 255.255.255.0 10.22.0.1 Objectives Part 1: Build the Network and Configure Basic Device Settings Part 2: Network Discovery with CDP Part 3: Network Discovery with LLDP Part 4: Configure and Verify NTP Background / Scenario Cisco Discovery Protocol (CDP) is a Cisco proprietary protocol for network discovery on the data link layer. It can share information such as device names and…
Lab – Research Password Recovery Procedures (Instructor Version) Objectives Part 1: Research the Configuration Register Identify the purpose of the configuration register. Describe router behavior for different configuration register values. Part 2: Document the Password Recovery Procedure for a Specific Cisco Router Research and record the process for password recovery on a specific Cisco router. Answer questions based on the researched procedure. Background / Scenario The purpose of this lab is to research the procedure for recovering or resetting the enable password on a specific Cisco router. The enable password protects access to privileged EXEC and configuration mode on Cisco…