200-120 - CCNA Cisco Certified Network Associate CCNA (803)
Go back to Cisco
Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?
What can be done to secure the virtual terminal interfaces on a router? (Choose two.)
Configure a virtual terminal password and login process.
Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
What are the three things that the Netflow uses to consider the traffic to be in a same flow? (Choose three)
L3 protocol type
What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?
B514 : 82C3 :: 0029 : EC7A : 0 : EC72
Which command encrypts all plaintext passwords?
Router(config)# service password-encryption
How is an EUI-64 format interface ID created from a 48-bit MAC address?
by inserting 0xFFFE between the upper three bytes and the lower three bytes of the MAC address.
What will be the result if the following configuration commands are implemented on a Cisco switch? Switch(config-if)# switchport port-security Switch(config-if)# switchport port-security mac-address sticky
A dynamically learned MAC address is saved in the running-configuration file.
A router has two Fast Ethernet interfaces and needs to connect to four VLANs in the local network. How can you accomplish this task, using the fewest physical interfaces and without decreasing network performance?
Implement a router-on-a-stick configuration.
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?
Main(config)# interface serial 0/0 Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation ppp Main(config-if)# no shut
Which protocol is an open standard protocol framework that is commonly used in VPNs to provide secure end-to-end communications?
At which layer of the OSI model is RSTP used to prevent loops?
Which two benefits are provided by using a hierarchical addressing network addressing scheme? (Choose two.)
reduces routing table entries
ease of management and troubleshooting
A network administrator is troubleshooting an EIGRP problem on a router and needs to confirm the IP addresses of the devices with which the router has established adjacency. The retransmit interval and the queue counts for the adjacent routers also need to be checked. What command will display the required information?
Router# show ip eigrp neighbors
Why will a switch never learn a broadcast address?
A broadcast address will never be the source address of a frame.
In an Ethernet network, under what two scenarios can devices transmit? (Choose two.)
when they detect no other devices are sending
when the medium is idle
Which statement describes the process of dynamically assigning IP addresses by the DHCP server?
Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.
Which two are features of IPv6? (Choose two.)
Which command is used to enable CHAP authentication, with PAP as the fallback method, on a serial interface?
Router(config-if)# ppp authentication chap pap
What is one benefit of PVST+?
PVST+ allows the root switch location to be optimized per VLAN.
An administrator must assign static IP addresses to the servers in a network. For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP properties box for the sales server?
IP address: 192.168.20.30 Subnet Mask: 255.255.255.248 Default Gateway: 192.168.20.25
If you want to have more than one Telnet session open at the same time, what key- stroke combination would you use?
Ctrl+Shift+6, then X
What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?
It designates VLAN 999 for untagged traffic.
What command is used to verify the DLCI destination address in a Frame Relay static configuration?
show frame-relay map
Which IPv6 address is the all-router multicast group?
Which two benefits are provided by creating VLANs? (Choose two.)
A router has learned three possible routes that could be used to reach a destination network. One route is from EIGRP and has a composite metric of 20514560. Another route is from OSPF with a metric of 782. The last is from RIPv2 and has a metric of 4. Which route or routes will the router install in the routing table?
the EIGRP route
Which characteristics are representative of a link-state routing protocol? (Choose three.)
provides common view of entire topology
calculates shortest path
utilizes event-triggered updates
VLAN 3 is not yet configured on your switch. What happens if you set the switchport access vlan 3 command in interface configuration mode?
The command is accepted and the respective VLAN is added to vlan.dat.
Syslog was configured with a level 3 trap. Which 3 types of logs would be generated (choose three)
An example of a device that operates on the physical layer is a .
Which two commands can be used to verify a trunk link configuration status on a given Cisco switch interface? (Choose two.)
show interface trunk
show interface switchport
What is the first 24 bits in a MAC address called?
Which statement about VLAN operation on Cisco Catalyst switches is true?
Unknown unicast frames are retransmitted only to the ports that belong to the same VLAN.
Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?
Which of the following statements are true of IPv6 address representation? (Choose two.)
A single interface may be assigned multiple IPv6 addresses of any type.
Every IPv6 interface contains at least one loopback address.
What is known as "one-to-nearest" addressing in IPv6?
Which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?
Which command enables RSTP on a switch?
spanning-tree mode rapid-pvst
Which statement describes VRRP object tracking?
It ensures the best VRRP router is the virtual router master for the group.
Which command is used to display the collection of OSPF link states?
show ip ospf database
Which two statistics appear in show frame-relay map output? (Choose two.)
the value of the local DLCI.
the status of the PVC that is configured on the router.
A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?
Which command displays CPU utilization?
Which two of these are characteristics of the 802.1Q protocol? (Choose two.)
It modifies the 802.3 frame header, and thus requires that the FCS be recomputed.
It is a trunking protocol capable of carrying untagged frames.
Assuming the default switch configuration, which VLAN range can be added, modified, and removed on a Cisco switch?
2 through 1001
Which set of commands is recommended to prevent the use of a hub in the access layer?
switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
Which command would you place on the interface of a private network?
ip nat inside
Which three are the components of SNMP? (Choose three)
You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?
Which command allows you to verify the encapsulation type (CISCO or IETF) for a Frame Relay link?
show frame-relay map