CCNA 3 Scaling Networks Ver 6.0 – ITN Pretest Exam Answers

CCNA 3 Scaling Networks Ver 6.0 – ITN Pretest Exam Answers
3 (2) votes
  1. What route would have the lowest administrative distance?

    a directly connected network*

    a route received through the EIGRP routing protocol

    a static route

    a route received through the OSPF routing protocol

  2. Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?

    SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch.

    SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch.

    SW1 drops the frame because it does not know the destination MAC address.

    SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch.*

  3. Which address prefix range is reserved for IPv4 multicast?

    169.254.0.0 – 169.254.255.255

    127.0.0.0 – 127.255.255.255

    240.0.0.0 – 254.255.255.255

    224.0.0.0 – 239.255.255.255*

  4. Refer to the exhibit. In what switch mode should port G0/1 be assigned if Cisco best practices are being used?

    auto

    trunk*

    native

    access

  5. Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?

    to identify the network address of the destination network*

    to identify the broadcast address of the destination network

    to identify the host address of the destination host

    to identify faulty frames

  6. Which range of link-local addresses can be assigned to an IPv6-enabled interface?

    FE80::/10*

    FEC0::/10

    FF00::/8

    FDEE::/7

  7. Which statement describes a difference between the operation of inbound and outbound ACLs?

    Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.*

    On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.

    Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers.

    In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria.

  8. What are three primary benefits of using VLANs? (Choose three.)

    no required configuration

    security*

    a reduction in the number of trunk links

    cost reduction*

    improved IT staff efficiency*

    end user satisfaction

  9. Refer to the exhibit. What command would be used to configure a static route on R1 so that traffic from both LANs can reach the 2001:db8:1:4::/64 remote network?

    ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::2*

    ipv6 route 2001:db8:1::/65 2001:db8:1:3::1

    ipv6 route 2001:db8:1:4::/64 2001:db8:1:3::1

    ipv6 route ::/0 serial0/0/0

  10. What is a characteristic of the distribution layer in the three layer hierarchical model?

    distributes access to end users

    acts as the backbone for the network, aggregating and distributing network traffic throughout the campus

    represents the network edge

    provides access to the rest of the network through switching, routing, and network access policies*

  11. Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

    Place extended ACLs close to the destination IP address of the traffic.

    Place extended ACLs close to the source IP address of the traffic.*

    Place standard ACLs close to the destination IP address of the traffic.*

    For every inbound ACL placed on an interface, there should be a matching outbound ACL.

    Filter unwanted traffic before it travels onto a low-bandwidth link.*

    Place standard ACLs close to the source IP address of the traffic.

  12. What routing table entry has a next hop address associated with a destination network?

    directly-connected routes

    local routes

    C and L source routes

    remote routes*

  13. Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces?

    legacy inter-VLAN routing

    routing via a multilayer switch

    routing for the management VLAN

    router on a stick*

  14. Which two devices allow hosts on different VLANs to communicate with each other? (Choose two.)

    repeater

    hub

    Layer 3 switch*

    Layer 2 switch

    router*

  15. Which two statements correctly describe a router memory type and its contents? (Choose two.)

    ROM is nonvolatile and stores the running IOS.

    FLASH is nonvolatile and contains a limited portion of the IOS.

    RAM is volatile and stores the IP routing table.*

    NVRAM is nonvolatile and stores a full version of the IOS.

    ROM is nonvolatile and contains basic diagnostic software.*

  16. What are three parts of an IPv6 global unicast address? (Choose three.)

    a subnet ID that is used to identify networks inside of the local enterprise site*

    an interface ID that is used to identify the local host on the network

    a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP

    an interface ID that is used to identify the local network for a particular host

    a global routing prefix that is used to identify the portion of the network address provided by a local administrator

  17. An IPv6 enabled device sends a data packet with the destination address of FF02::2. What is the target of this packet?

    all IPv6 enabled devices on the local link

    all IPv6 DHCP servers

    all IPv6 configured routers on the local link*

    all IPv6 enabled devices across the network

  18. A router is configured to participate in multiple routing protocol: RIP, EIGRP, and OSPF. The router must send a packet to network 192.168.14.0. Which route will be used to forward the traffic?

    a 192.168.14.0/26 route that is learned via RIP*

    a 192.168.14.0/25 route that is learned via RIP

    a 192.168.14.0/25 route that is learned via OSPF

    a 192.168.14.0/24 route that is learned via EIGRP

  19. Which subnet would include the address 192.168.1.96 as a usable host address?

    192.168.1.64/29

    192.168.1.32/28

    192.168.1.32/27

    192.168.1.64/26*

  20. What does the IP address 192.168.1.15/29 represent?

    multicast address

    broadcast address*

    unicast address

    subnetwork address

  21. Refer to the exhibit. A network administrator is implementing the stateless DHCPv6 operation for the company. Clients are configuring IPv6 addresses as expected. However, the clients are not getting the DNS server address and the domain name information configured in the DHCP pool. What could be the cause of the problem?

    The GigabitEthernet interface is not activated.

    The DNS server address is not on the same network as the clients are on.

    The router is configured for SLAAC operation.*

    The clients cannot communicate with the DHCPv6 server, evidenced by the number of active clients being 0.

  22. An organization is assigned an IPv6 address block of 2001:db8:0:ca00::/56. How many subnets can be created without using bits in the interface ID space?

    4096

    256*

    512

    1024

  23. What is the term that is used for the area of a network that is affected when a device or network service experiences problems?

    failure domain*

    user domain

    broadcast domain

    collision domain

  24. As the network administrator you have been asked to implement EtherChannel on the corporate network. What does this configuration consist of?

    grouping two devices to share a virtual IP address

    providing redundant links that dynamically block or forward traffic

    providing redundant devices to allow traffic to flow in the event of device failure

    grouping multiple physical ports to increase bandwidth between two switches*

  25. Which characteristic would most influence a network design engineer to select a multilayer switch over a Layer 2 switch?

    ability to aggregate multiple ports for maximum data throughput

    ability to have multiple forwarding paths through the switched network based on VLAN number(s)

    ability to build a routing table*

    ability to provide power to directly-attached devices and the switch itself

  26. A network administrator is planning to add a new switch to the network. What should the network administrator do to ensure the new switch exchanges VTP information with the other switches in the VTP domain?

    Configure all ports on the new switch to access mode.

    Configure the VLANs on the new switch.

    Associate all ports of the new switch to a VLAN that is not VLAN 1.

    Configure the correct VTP domain name and password on the new switch.*

  27. Refer to the exhibit. Switch SW-A is to be used as a temporary replacement for another switch in the VTP Student domain. What two pieces of information are indicated from the exhibited output? (Choose two.)

    There is a risk that the switch may cause incorrect VLAN information to be sent through the domain.*

    VLAN configuration changes made on this switch will be sent to other devices in the VTP domain.

    The other switches in the domain can be running either VTP version 1 or 2.

    This switch will update its VLAN configuration when VLAN changes are made on a VTP server in the same domain.*

    VTP will block frame forwarding on at least one redundant trunk port that is configured on this switch.

  28. Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?

    Associate hosts A and B with VLAN 10 instead of VLAN 1.

    Configure either trunk port in the dynamic desirable mode.*

    Include a router in the topology.

    Add the switchport nonegotiate command to the configuration of SW2.

    Remove the native VLAN from the trunk.

  29. What eliminates switching loops?

    Time to Live

    VTP

    hold-down timers

    poison reverse

    Spanning Tree Protocol*

  30. Refer to the exhibit. Which switch will be elected the root bridge and which switch will place a port in blocking mode? (Choose two.)

    SW2 will get a port blocked.

    SW4 will get a port blocked.*

    SW1 will become the root bridge.

    SW4 will become the root bridge.

    SW2 will become the root bridge.

    SW3 will become the root bridge.*

  31. Refer to the exhibit. A network administrator has configured OFPF in the topology as shown. What is the preferred path to get from the LAN network that is connected to R1 to the LAN network that is connected to R7?

    R1-R2-R6-R7

    R1-R3-R4-R5-R6-R7*

    R1-R4-R5-R6-R7

    R1-R3-R2-R6-R7

  32. Which statement describes the autonomous system number used in EIGRP configuration on a Cisco router?

    It carries the geographical information of the organization.

    It is a globally unique autonomous system number that is assigned by IANA.

    It functions as a process ID in the operation of the router.*

    It identifies the ISP that provides the connection to network of the organization.

  33. An EIGRP router loses the route to a network. Its topology table contains two feasible successors to the same network. What action will the router take?

    The DUAL algorithm is recomputed to find an alternate route.

    The best alternative backup route is immediately inserted into the routing table.*

    The router will query neighbors for an alternate route.

    The router uses the default route.

  34. What is a function of OSPF hello packets?

    to send specifically requested link-state records

    to ensure database synchronization between routers

    to discover neighbors and build adjacencies between them*

    to request specific link-state records from neighbor routers

  35. Refer to the exhibit. R1 and R2 are OSPFv3 neighbors. Which address would R1 use as the next hop for packets that are destined for the Internet?

    2001:DB8:C5C0:1::2

    FE80::21E:BEFF:FEF4:5538*

    FF02::5

    2001:DB8:ACAD:1::2

Post Comment