CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • A+
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+ [N10-007]
          • Network+ [N10-008]
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
        • Google
          • Cloud Architect
        • Microsoft
          • MTA Database
          • MTA Python
          • MTA Windows 10
          • MTA Server
          • MTA Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Web Development
          • PhP Fundamentals
          • CSS Fundamentals
          • HTML Fundamentals
          • MySQL Fundamentals
          • Learn JavaScript
          • Python From Scratch
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • CompTIA
          • A+
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+ [N10-007]
          • Network+ [N10-008]
          • PenTest+
          • Project+
          • Security+
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Wireshark
          • WCNA
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • Python
          • PCEP
          • PCAP
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
        • Google
          • Cloud Architect
        • Microsoft
          • MTA Database
          • MTA Python
          • MTA Windows 10
          • MTA Server
          • MTA Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • ITIL
          • ITIL Foundations
        • Web Development
          • PhP Fundamentals
          • CSS Fundamentals
          • HTML Fundamentals
          • MySQL Fundamentals
          • Learn JavaScript
          • Python From Scratch
        • EC Council
          • Certified Ethical Hacker
        • ISC2
          • SSCP
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

Free CCNA Practice Test – Exam Walkthrough

Back to exams page.

loading

Check out our Cisco CCNA video and lab course by clicking on 'Courses' above.

Our books for the Cisco CCNA are all available on Amazon.

q? encoding=UTF8&MarketPlace=US&ASIN=B0875YW7G2&ServiceVersion=20070822&ID=AsinImage&WS=1&Format= SL250 &tag=theboosum 20

q? encoding=UTF8&MarketPlace=US&ASIN=B08CB6JDWY&ServiceVersion=20070822&ID=AsinImage&WS=1&Format= SL250 &tag=theboosum 20

1.

The left are IPv6 prefixes, while the right are the IPv6 prefix types. Click on the right item which matches the left. Click again to deselect.

2000::/3
6to4

Unselect

Link local

Unselect

Multicast

Unselect

Global unicast

Unselect

Unique local

Unselect

fc00::/7
6to4

Unselect

Link local

Unselect

Multicast

Unselect

Global unicast

Unselect

Unique local

Unselect

fe80::/10
6to4

Unselect

Link local

Unselect

Multicast

Unselect

Global unicast

Unselect

Unique local

Unselect

2002::/16
6to4

Unselect

Link local

Unselect

Multicast

Unselect

Global unicast

Unselect

Unique local

Unselect

ff00::/8
6to4

Unselect

Link local

Unselect

Multicast

Unselect

Global unicast

Unselect

Unique local

Unselect

Question 1 of 103

2.

You have the following topology in your network and a Frame Flooding attack just ended.
Just after the attack you connect a new host on the network (host C) and start sending traffic to host A, what happens and what you can do to prevent your environment from this to happening again?

2 

Question 2 of 103

3.
Three new switches were just installed and the host A cannot ping host C. Which statements are true regarding the configuration below?
3 1 

3 23 33 4 

Question 3 of 103

4.

Refer to the command output below:

4 14 2Which statements are true regarding the routing table above?

Question 4 of 103

5.

Regarding the following architecture, which statements are true?

spine leaf

Question 5 of 103

6.

Which of the following are examples of WAN multi-access networks? Choose all that apply.

Question 6 of 103

7.

Regarding WAN architecture, which of the following are examples of point-to-point connection? Choose all that apply.

Question 7 of 103

8.

Considering the THREE TIER network architecture model, which of the following statements are true regarding the DISTRIBUTION Layer?

Question 8 of 103

9.

Considering the THREE TIER network architecture model, which of the following statements are true regarding the CORE Layer?

Question 9 of 103

10.

Click on the correct descriptions of the Cloud Service types. Click again to unselect.

Infrastructure As A Service (IAAS)
The examples of this model are SalesForce and Office 365.

Unselect

The examples of this model are Azure Cloud Services and AWS Elastic Beanstalk.

Unselect

The examples of this model are Amazon Web Services and Microsoft Azure.

Unselect

Platform As A Service (PAAS)
The examples of this model are SalesForce and Office 365.

Unselect

The examples of this model are Azure Cloud Services and AWS Elastic Beanstalk.

Unselect

The examples of this model are Amazon Web Services and Microsoft Azure.

Unselect

Software As A Service (SAAS)
The examples of this model are SalesForce and Office 365.

Unselect

The examples of this model are Azure Cloud Services and AWS Elastic Beanstalk.

Unselect

The examples of this model are Amazon Web Services and Microsoft Azure.

Unselect

Question 10 of 103

11.

Select all statements which represents IAAS solutions provided by Cisco?

Question 11 of 103

12.

Select all statements which represents SaaS solutions.

Question 12 of 103

13.

Regarding the following topology, which statement is TRUE?

CDP1

Question 13 of 103

14.

Regarding the following topology, which statement is TRUE?

CDP2

Question 14 of 103

15.

Refer to the following config output and select the correct statement.

CDP3

Question 15 of 103

16.

Refer to the following 'show lldp neighbor detail' output.

LLDP1Which of the following information is possible to get from the LLDP neighbor, according to this output? Select all that apply.

Question 16 of 103

17.

Click on the supported speed which match the types of SFPs.

SFP
10 Gbps

Unselect

40 Gbps

Unselect

100/400 Gbps

Unselect

1 Gbps

Unselect

25 Gbps

Unselect

40/100 Gbps

Unselect

SFP+
10 Gbps

Unselect

40 Gbps

Unselect

100/400 Gbps

Unselect

1 Gbps

Unselect

25 Gbps

Unselect

40/100 Gbps

Unselect

SFP28
10 Gbps

Unselect

40 Gbps

Unselect

100/400 Gbps

Unselect

1 Gbps

Unselect

25 Gbps

Unselect

40/100 Gbps

Unselect

QSFP
10 Gbps

Unselect

40 Gbps

Unselect

100/400 Gbps

Unselect

1 Gbps

Unselect

25 Gbps

Unselect

40/100 Gbps

Unselect

QSFP28
10 Gbps

Unselect

40 Gbps

Unselect

100/400 Gbps

Unselect

1 Gbps

Unselect

25 Gbps

Unselect

40/100 Gbps

Unselect

QSFP-DD
10 Gbps

Unselect

40 Gbps

Unselect

100/400 Gbps

Unselect

1 Gbps

Unselect

25 Gbps

Unselect

40/100 Gbps

Unselect

Question 17 of 103

18.

Click the 'show interfaces' field to its description. Right side is clickable.

Ethernet . . . is up
Gives the maximum transmission unit of the interface.

Unselect

Indicates whether interface has been taken down by an administrator.

Unselect

Indicates whether the interface hardware is currently active.

Unselect

Indicates whether the software processes that handle the line protocol believe that the interface is usable (that is, whether keepalives are successful)

Unselect

Specifies the hardware type (for example, MCI Ethernet, SCI, cBus Ethernet) and address.

Unselect

Gives the bandwidth of the interface in kilobits per second.

Unselect

Ethernet . . . is administratively down
Gives the maximum transmission unit of the interface.

Unselect

Indicates whether interface has been taken down by an administrator.

Unselect

Indicates whether the interface hardware is currently active.

Unselect

Indicates whether the software processes that handle the line protocol believe that the interface is usable (that is, whether keepalives are successful)

Unselect

Specifies the hardware type (for example, MCI Ethernet, SCI, cBus Ethernet) and address.

Unselect

Gives the bandwidth of the interface in kilobits per second.

Unselect

line protocol is up
Gives the maximum transmission unit of the interface.

Unselect

Indicates whether interface has been taken down by an administrator.

Unselect

Indicates whether the interface hardware is currently active.

Unselect

Indicates whether the software processes that handle the line protocol believe that the interface is usable (that is, whether keepalives are successful)

Unselect

Specifies the hardware type (for example, MCI Ethernet, SCI, cBus Ethernet) and address.

Unselect

Gives the bandwidth of the interface in kilobits per second.

Unselect

Hardware
Gives the maximum transmission unit of the interface.

Unselect

Indicates whether interface has been taken down by an administrator.

Unselect

Indicates whether the interface hardware is currently active.

Unselect

Indicates whether the software processes that handle the line protocol believe that the interface is usable (that is, whether keepalives are successful)

Unselect

Specifies the hardware type (for example, MCI Ethernet, SCI, cBus Ethernet) and address.

Unselect

Gives the bandwidth of the interface in kilobits per second.

Unselect

MTU
Gives the maximum transmission unit of the interface.

Unselect

Indicates whether interface has been taken down by an administrator.

Unselect

Indicates whether the interface hardware is currently active.

Unselect

Indicates whether the software processes that handle the line protocol believe that the interface is usable (that is, whether keepalives are successful)

Unselect

Specifies the hardware type (for example, MCI Ethernet, SCI, cBus Ethernet) and address.

Unselect

Gives the bandwidth of the interface in kilobits per second.

Unselect

BW
Gives the maximum transmission unit of the interface.

Unselect

Indicates whether interface has been taken down by an administrator.

Unselect

Indicates whether the interface hardware is currently active.

Unselect

Indicates whether the software processes that handle the line protocol believe that the interface is usable (that is, whether keepalives are successful)

Unselect

Specifies the hardware type (for example, MCI Ethernet, SCI, cBus Ethernet) and address.

Unselect

Gives the bandwidth of the interface in kilobits per second.

Unselect

Question 18 of 103

19.

Refer to the command outputs below and select all the correct statements.

mac add

Question 19 of 103

20.

You are the network analyst of FloodIT company and you need to restrict the management access to the RTR01 router, where just the IP 192.168.10.100 will be able to access it through SSH. No other host or protocol should be allowed. Which commands should be used to accomplish this task?

Question 20 of 103

21.

Considering the PAgP protocol, which statements are true?

 

Question 21 of 103

22.

Considering the LACP protocol, which statements are true?

 

Question 22 of 103

23.

You need to configure the switch SW01 to stablish a trunk connection to the SW02.
On this configuration, SW01 must communicate through all the VLANs with SW02.
All the untagged traffic must be tagged as VLAN 100.
Which script you should use to accomplish this task?

 

Question 23 of 103

24.

Refer to the 'show interface Gi1/0/1 switchport' output command below.

shintswitchportIf this interface receives an untagged traffic, to which VLAN this traffic will be delivered?

Question 24 of 103

25.

Which protocol should be used to configure a trunk interface between some Cisco switch and a Cisco router?

 

Question 25 of 103

26.

Refer to the 'show interface Gi1/0/23 switchport' command output.

shintswitchport2Which VLANs are allowed to communicate through this interface?

Question 26 of 103

27.

You are including a new switch to your network infrastructure.
Before connect the switch to the network, you delete all VLAN entries, configure VTP mode as client and configure the same VTP domain from the current network.
When you connect the switch to the network, all the network stops responding. What can be the issue?

Question 27 of 103

28.

Considering the following command output, select all the correct statements.

shspanningtree

Question 28 of 103

29.

Click to match the interface speed to the proper default STP port cost value.

100Gbps
4

Unselect

19

Unselect

1

Unselect

2

Unselect

100

Unselect

10Gbps
4

Unselect

19

Unselect

1

Unselect

2

Unselect

100

Unselect

1Gbps
4

Unselect

19

Unselect

1

Unselect

2

Unselect

100

Unselect

100Mbps
4

Unselect

19

Unselect

1

Unselect

2

Unselect

100

Unselect

10Mbps
4

Unselect

19

Unselect

1

Unselect

2

Unselect

100

Unselect

Question 29 of 103

30.

When a switch comes up, there is a sequence of STP port states used by STP to prevent loops. Put the following port states in order as per the definition.

  • listening
  • blocking
  • forwarding
  • initialization
  • learning

Question 30 of 103

31.

TCP and UDP protocols are part of which OSI Model layer?

Question 31 of 103

32.

What are the standard ports used by SSH and HTTP protocols, respectively?

Question 32 of 103

33.

Select the characteristics of TCP protocol. Choose all that apply.

Question 33 of 103

34.

Which of the following are IP address networks reserved for private address as per RFC 1918?

 

Question 34 of 103

35.

Which CIDR better fits the summarization of the prefixes 200.1.32.0/24, 200.1.33.0/24, 200.1.34.0/24 and 200.1.35.0/24?

 

Question 35 of 103

36.

Which of the following are usable IP addresses?

Question 36 of 103

37.

What is the correct subnet mask for the prefix 192.168.123.0/27

Question 37 of 103

38.

What is the correct wildcard mask for the prefix 200.116.222.0/29

Question 38 of 103

39.

Which command should be used to add a route to the subnet 10.0.0.0/25 using 192.168.1.1 as a gateway on IOS?

Question 39 of 103

40.

What is the correct order in the route selection process?

  • Metrics
  • Prefix length
  • Administrative distance

Question 40 of 103

41.

On the table below, which Next Hop will be used to reach 192.168.1.10?

tableroutes1

Question 41 of 103

42.

On the table below, which Next Hop will be used to reach 192.168.1.10?

tableroutes2

Question 42 of 103

43.

On the following routing table, which will be the next hop to the destination address 192.168.32.1?

shiproute

Question 43 of 103

44.

The adjacency building process takes effect after multiple stages have been fulfilled.
Drag the OSPF transitional stages in the correct order.

 
  • Loading
  • Init
  • Two-way
  • Exstart
  • Down
  • Exchange
  • Full

Question 44 of 103

45.

Which interface level command should be used to configure it on OSPF area 10?

 

Question 45 of 103

46.

Refer to the following show output.

shipospfintWhich statements are true regarding the output above?

Question 46 of 103

47.

Refer to the show ip route outputs below.

shiproutetopologyWhat script should be used to advertise the default route (since the default route is on routing table) and 10.x.x.x subnets from area 0 as 10.0.0.0/21 to RTR3? 

Question 47 of 103

48.

Click the OSPF LSA Types which match the proper description on the right. Right side is clickable.

LSA Type 1
Summary ASBR LSA

Unselect

Summary LSA

Unselect

Autonomous system external LSA

Unselect

Network LSA

Unselect

NSSA External LSA

Unselect

Router LSA

Unselect

LSA Type 2
Summary ASBR LSA

Unselect

Summary LSA

Unselect

Autonomous system external LSA

Unselect

Network LSA

Unselect

NSSA External LSA

Unselect

Router LSA

Unselect

LSA Type 3
Summary ASBR LSA

Unselect

Summary LSA

Unselect

Autonomous system external LSA

Unselect

Network LSA

Unselect

NSSA External LSA

Unselect

Router LSA

Unselect

LSA Type 4
Summary ASBR LSA

Unselect

Summary LSA

Unselect

Autonomous system external LSA

Unselect

Network LSA

Unselect

NSSA External LSA

Unselect

Router LSA

Unselect

LSA Type 5
Summary ASBR LSA

Unselect

Summary LSA

Unselect

Autonomous system external LSA

Unselect

Network LSA

Unselect

NSSA External LSA

Unselect

Router LSA

Unselect

LSA Type 7
Summary ASBR LSA

Unselect

Summary LSA

Unselect

Autonomous system external LSA

Unselect

Network LSA

Unselect

NSSA External LSA

Unselect

Router LSA

Unselect

Question 48 of 103

49.

Click the OSPF area types to match the restriction. Right side is clickable.

Normal
No Type 3, 4 or 5 LSAs except the default summary route, but Type 7 LSAs that convert to Type 5 at the NSSA ABR are allowed

Unselect

No Type 3, 4 or 5 LSAs allowed except the default summary route

Unselect

None

Unselect

No Type 5 AS-external LSAs allowed, but Type 7 LSAs that convert to Type 5 at the NSSA ABR can traverse

Unselect

No Type 5 AS-external LSA allowed

Unselect

Stub
No Type 3, 4 or 5 LSAs except the default summary route, but Type 7 LSAs that convert to Type 5 at the NSSA ABR are allowed

Unselect

No Type 3, 4 or 5 LSAs allowed except the default summary route

Unselect

None

Unselect

No Type 5 AS-external LSAs allowed, but Type 7 LSAs that convert to Type 5 at the NSSA ABR can traverse

Unselect

No Type 5 AS-external LSA allowed

Unselect

Totally Stub
No Type 3, 4 or 5 LSAs except the default summary route, but Type 7 LSAs that convert to Type 5 at the NSSA ABR are allowed

Unselect

No Type 3, 4 or 5 LSAs allowed except the default summary route

Unselect

None

Unselect

No Type 5 AS-external LSAs allowed, but Type 7 LSAs that convert to Type 5 at the NSSA ABR can traverse

Unselect

No Type 5 AS-external LSA allowed

Unselect

NSSA
No Type 3, 4 or 5 LSAs except the default summary route, but Type 7 LSAs that convert to Type 5 at the NSSA ABR are allowed

Unselect

No Type 3, 4 or 5 LSAs allowed except the default summary route

Unselect

None

Unselect

No Type 5 AS-external LSAs allowed, but Type 7 LSAs that convert to Type 5 at the NSSA ABR can traverse

Unselect

No Type 5 AS-external LSA allowed

Unselect

NSSA Totally Stub
No Type 3, 4 or 5 LSAs except the default summary route, but Type 7 LSAs that convert to Type 5 at the NSSA ABR are allowed

Unselect

No Type 3, 4 or 5 LSAs allowed except the default summary route

Unselect

None

Unselect

No Type 5 AS-external LSAs allowed, but Type 7 LSAs that convert to Type 5 at the NSSA ABR can traverse

Unselect

No Type 5 AS-external LSA allowed

Unselect

Question 49 of 103

50.

Regarding the output below, which commands should be used to redistribute routes between OSPF and EIGRP? RTR4 must receive the default route either.

rtr3 shrun

Question 50 of 103

51.

Regarding the following command output, which statements are true?

rtr3 shipprotocols

Question 51 of 103

52.

Which statements are true regarding the following command line?
Router(config)# ip nat inside source static 10.1.1.2 200.1.1.2

 

Question 52 of 103

53.

An internal host cannot reach the 200.201.202.203 server on the internet.
You were asked to fix this. Which commands you need to issue on RTR01 to accomplish this?
BTW, the host already reaches RTR1, so don´t need to worry about routing issues. You need to allow the communication to any tcp port.

nat1

Question 53 of 103

54.

An internal HTTP service must be published to the internet using the standard HTTP port, as per the topology below.
You were asked to publish only HTTP service (using the standard port) using the public IP 100.101.102.103. Which commands you need to issue on RTR01 to accomplish this?
BTW, the server already reaches RTR1, so don´t need to worry about routing issues.

nat2

Question 54 of 103

55.

You are the security engineer of SecureIT company.
You need to implement a cloud proxy solution, where your local hosts will need to reach the proxy server to access any external website.
Currently, all the hosts are using static proxy configuration pointing to the IP address 192.168.100.100 and port TCP/3080.
Which configuration can be used to make this migration with low impact?
The new proxy IP is 200.201.202.203 and the new TCP port is TCP/9400.

nat3

Question 55 of 103

56.

Which command can be used to allow internal IP addresses from the corporate network 10.0.0.0/24 to access any public IP, using the interface Gi0/0/0 as translated source?

nat4

Question 56 of 103

57.

You need to configure you network switch to use the router as the NTP server.
Which configuration must be done in the switch to accomplish this task? Follow the information needed:
NTP server IP: 192.168.0.1
key: cisco

 

Question 57 of 103

58.

You need to configure a NTP server for your internal network with MD5 authentication using the password cisco.
Which configuration must be done on the NTP server to accomplish this task?

Question 58 of 103

59.

Drag the syslog ID on the left to the proper syslog level on the right.

1
critical

Unselect

warnings

Unselect

notification

Unselect

debugging

Unselect

alerts

Unselect

informational

Unselect

errors

Unselect

2
critical

Unselect

warnings

Unselect

notification

Unselect

debugging

Unselect

alerts

Unselect

informational

Unselect

errors

Unselect

3
critical

Unselect

warnings

Unselect

notification

Unselect

debugging

Unselect

alerts

Unselect

informational

Unselect

errors

Unselect

4
critical

Unselect

warnings

Unselect

notification

Unselect

debugging

Unselect

alerts

Unselect

informational

Unselect

errors

Unselect

5
critical

Unselect

warnings

Unselect

notification

Unselect

debugging

Unselect

alerts

Unselect

informational

Unselect

errors

Unselect

6
critical

Unselect

warnings

Unselect

notification

Unselect

debugging

Unselect

alerts

Unselect

informational

Unselect

errors

Unselect

7
critical

Unselect

warnings

Unselect

notification

Unselect

debugging

Unselect

alerts

Unselect

informational

Unselect

errors

Unselect

Question 59 of 103

60.

Which of the following configuration should be used to send syslog messages to the syslog server 192.168.0.10, limiting the messages to warning and higher?

 

Question 60 of 103

61.

You already configure the syslog server to receive logs from your network devices.
Now, you need to limit the number of messages per second to 10. Make sure this will not affect the messages from level 3 or higher.

Question 61 of 103

62.

You configure HSRP per the topology below. After the implementation, you notice the following message:

%HSRP-4-DIFFVIP1: GigabitEthernet0/0 Grp 1 active routers virtual IP address 192.168.200.1 is different to the locally configured address 192.168.200.254What can be the cause of this issue?hsrp1

Question 62 of 103

63.

You need to implement HSRP as per the following topology.
When the primary router fails, the secondary needs to be activated. Once the primary becomes online again, it needs to be the active again.
Which of the presented script can be used to accomplish the task?

Question 63 of 103

64.

What is the main purpose of using FHRP?

Question 64 of 103

65.

Which of the following access-list should be used to deny the following specific inbound traffic in the interface Gi0/0?
SOURCE: 192.168.0.10
DESTINATION: 200.200.200.200
PROTOCOL: IP

Question 65 of 103

66.

You need to create an access-list where:
- SSH traffic with destination 192.168.10.10 must be blocked just from subnet 192.168.0.0/24;
- NTP traffic with destination 1.2.3.4 must be allowed just from subnet 192.168.0.0/24;
- All the remaining traffic must be allowed.

Which of the following access-list should be used?

Question 66 of 103

67.

Drag the prefix on the right to the respective wildcard on the right.

192.168.5.16/28
0.0.1.255

Unselect

0.0.15.255

Unselect

0.0.0.15

Unselect

0.0.7.255

Unselect

0.0.0.63

Unselect

200.201.240.0/20
0.0.1.255

Unselect

0.0.15.255

Unselect

0.0.0.15

Unselect

0.0.7.255

Unselect

0.0.0.63

Unselect

210.255.128.0/21
0.0.1.255

Unselect

0.0.15.255

Unselect

0.0.0.15

Unselect

0.0.7.255

Unselect

0.0.0.63

Unselect

10.165.54.0/23
0.0.1.255

Unselect

0.0.15.255

Unselect

0.0.0.15

Unselect

0.0.7.255

Unselect

0.0.0.63

Unselect

10.125.24.0/26
0.0.1.255

Unselect

0.0.15.255

Unselect

0.0.0.15

Unselect

0.0.7.255

Unselect

0.0.0.63

Unselect

Question 67 of 103

68.

You need to configure a router for AAA authentication using TACACS+ and local authentication as a fallback. Which of the following script can be used?

Question 68 of 103

69. Which of the following are characteristics of the TACACS+ protocol?

Question 69 of 103

70.

Which of the following are characteristics of the RADIUS protocol?

Question 70 of 103

71.

Drag the attack type on the left to the correct definition on the right.

 
IP Address Spoofing Attack
Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

Unselect

A threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet.

Unselect

It is an application or device that can read, monitor, and capture network data exchanges and read network packets.

Unselect

If threat actors discover a valid user account, the threat actors have the same rights as the real user.

Unselect

This attack occurs when threat actors have positioned themselves between a source and destination.

Unselect

Password-Based Attacks
Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

Unselect

A threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet.

Unselect

It is an application or device that can read, monitor, and capture network data exchanges and read network packets.

Unselect

If threat actors discover a valid user account, the threat actors have the same rights as the real user.

Unselect

This attack occurs when threat actors have positioned themselves between a source and destination.

Unselect

Denial of Service Attack
Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

Unselect

A threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet.

Unselect

It is an application or device that can read, monitor, and capture network data exchanges and read network packets.

Unselect

If threat actors discover a valid user account, the threat actors have the same rights as the real user.

Unselect

This attack occurs when threat actors have positioned themselves between a source and destination.

Unselect

Man-in-the-Middle Attack
Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

Unselect

A threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet.

Unselect

It is an application or device that can read, monitor, and capture network data exchanges and read network packets.

Unselect

If threat actors discover a valid user account, the threat actors have the same rights as the real user.

Unselect

This attack occurs when threat actors have positioned themselves between a source and destination.

Unselect

Sniffer Attack
Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

Unselect

A threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet.

Unselect

It is an application or device that can read, monitor, and capture network data exchanges and read network packets.

Unselect

If threat actors discover a valid user account, the threat actors have the same rights as the real user.

Unselect

This attack occurs when threat actors have positioned themselves between a source and destination.

Unselect

Question 71 of 103

72.

Which of the following definition is related to Ransomware?

 

Question 72 of 103

73.

Which of the following definition is related to Rootkit?

 

Question 73 of 103

74.

Which of the following script can be used to configure SSHv2 as authentication protocol?

Question 74 of 103

75.

Which type of hacker attempt to discover exploits and report them to vendors, sometimes for prizes or rewards?

 

Question 75 of 103

76.

Which switch feature can be used to protect the network against man-in-the-middle attacks?

Question 76 of 103

77. You need to activate DAI in the VLAN 10 per the following definitions:
Ports 1 to 40 - Untrusted
Ports 41 to 48 - Trusted

Which script can be used?

Question 77 of 103

78.

Which type of IPv6 address are allocated from the unicast address space to be assigned to a set of interfaces that typically belong to different nodes?

Question 78 of 103

79.

Which of the following are multicast addresses?

Question 79 of 103

80.

Which statement provides the correct value used by the host to assign itself an EUI-64 address from it´s MAC address?

Question 80 of 103

81.

Which of the following statements are needed to assign a EUI-64 IPv6 address to an interface using a specific prefix?

Question 81 of 103

82.

After you create the NAT entry to use the cloud proxy internally in your network, you need to evolve this architecture changing the IP based proxy to a DNS name-based implementation.
As you don´t have any DNS server locally (since this is a small office), you need to configure DNS service on the router and create an entry for the proxy server.
The name will be proxy.secureit.net and the IP address is 192.168.100.100.
As per the corporate policy, no public access is allowed directly from hosts, just through the proxy. So, make sure public hosts will not be translated.
Which configuration must be used to accomplish this task?

nat2

Question 82 of 103

83.

Everytime you misspell a command, the router tries to translate it. Since you are not using DNS on the router, you want to disable it.
Which command can be used in a Cisco router to avoid the router from DNS translations?

Question 83 of 103

84.

What is the definition of LLQ and what is the command to configure it?

Question 84 of 103

85.

Which of the following statements is the term used to indicate the difference in the end-to-end delay between packets?

Question 85 of 103

86.

You need to implement a QoS policy in your network.
The first task is to define the QoS classes.
Which of the following definitions would be the recommended?

Question 86 of 103

87. Regarding QoS Conditionally-Trusted Endpoint. Which protocol is used to identify a Cisco phone connected to the switch, trusting it´s QoS markings?

Question 87 of 103

88.

You already configure voice and access VLAN to all users ports on a switch. Which of the following commands are necessary to enable port security and limit the number of mac addresses per port to 1 on each voice and access vlan?
Make sure the ports will not disable when a violation occurs. Just drop the unknown source address packets and generates a SNMP trap to the syslog.

Question 88 of 103

89.

Drag each WLAN Standard on the left, to it´s description on the right.

802.11
Speeds of up to 2 Mbps

Unselect

Released in 2019. Also known as High-Efficiency Wireless (HEW). Handles many connected devices

Unselect

Provides data rates ranging from 450 Mbps to 1.3 Gbps (1300 Mbps) using MIMO technology

Unselect

Speeds of up to 54 Mbps, small coverage area and not interoperable with 802.11b and 802.11g

Unselect

Data rates ranging from 150 Mbps to 600 Mbps with a distance range of up to 70 m (230 feet)

Unselect

Speeds of up to 11 Mbps and it´s better able to penetrate building structures

Unselect

Speeds of up to 54 Mbps and backward compatible with 802.11b with reduced bandwidth capacity

Unselect

802.11a
Speeds of up to 2 Mbps

Unselect

Released in 2019. Also known as High-Efficiency Wireless (HEW). Handles many connected devices

Unselect

Provides data rates ranging from 450 Mbps to 1.3 Gbps (1300 Mbps) using MIMO technology

Unselect

Speeds of up to 54 Mbps, small coverage area and not interoperable with 802.11b and 802.11g

Unselect

Data rates ranging from 150 Mbps to 600 Mbps with a distance range of up to 70 m (230 feet)

Unselect

Speeds of up to 11 Mbps and it´s better able to penetrate building structures

Unselect

Speeds of up to 54 Mbps and backward compatible with 802.11b with reduced bandwidth capacity

Unselect

802.11b
Speeds of up to 2 Mbps

Unselect

Released in 2019. Also known as High-Efficiency Wireless (HEW). Handles many connected devices

Unselect

Provides data rates ranging from 450 Mbps to 1.3 Gbps (1300 Mbps) using MIMO technology

Unselect

Speeds of up to 54 Mbps, small coverage area and not interoperable with 802.11b and 802.11g

Unselect

Data rates ranging from 150 Mbps to 600 Mbps with a distance range of up to 70 m (230 feet)

Unselect

Speeds of up to 11 Mbps and it´s better able to penetrate building structures

Unselect

Speeds of up to 54 Mbps and backward compatible with 802.11b with reduced bandwidth capacity

Unselect

802.11g
Speeds of up to 2 Mbps

Unselect

Released in 2019. Also known as High-Efficiency Wireless (HEW). Handles many connected devices

Unselect

Provides data rates ranging from 450 Mbps to 1.3 Gbps (1300 Mbps) using MIMO technology

Unselect

Speeds of up to 54 Mbps, small coverage area and not interoperable with 802.11b and 802.11g

Unselect

Data rates ranging from 150 Mbps to 600 Mbps with a distance range of up to 70 m (230 feet)

Unselect

Speeds of up to 11 Mbps and it´s better able to penetrate building structures

Unselect

Speeds of up to 54 Mbps and backward compatible with 802.11b with reduced bandwidth capacity

Unselect

802.11n
Speeds of up to 2 Mbps

Unselect

Released in 2019. Also known as High-Efficiency Wireless (HEW). Handles many connected devices

Unselect

Provides data rates ranging from 450 Mbps to 1.3 Gbps (1300 Mbps) using MIMO technology

Unselect

Speeds of up to 54 Mbps, small coverage area and not interoperable with 802.11b and 802.11g

Unselect

Data rates ranging from 150 Mbps to 600 Mbps with a distance range of up to 70 m (230 feet)

Unselect

Speeds of up to 11 Mbps and it´s better able to penetrate building structures

Unselect

Speeds of up to 54 Mbps and backward compatible with 802.11b with reduced bandwidth capacity

Unselect

802.11ac
Speeds of up to 2 Mbps

Unselect

Released in 2019. Also known as High-Efficiency Wireless (HEW). Handles many connected devices

Unselect

Provides data rates ranging from 450 Mbps to 1.3 Gbps (1300 Mbps) using MIMO technology

Unselect

Speeds of up to 54 Mbps, small coverage area and not interoperable with 802.11b and 802.11g

Unselect

Data rates ranging from 150 Mbps to 600 Mbps with a distance range of up to 70 m (230 feet)

Unselect

Speeds of up to 11 Mbps and it´s better able to penetrate building structures

Unselect

Speeds of up to 54 Mbps and backward compatible with 802.11b with reduced bandwidth capacity

Unselect

802.11ax
Speeds of up to 2 Mbps

Unselect

Released in 2019. Also known as High-Efficiency Wireless (HEW). Handles many connected devices

Unselect

Provides data rates ranging from 450 Mbps to 1.3 Gbps (1300 Mbps) using MIMO technology

Unselect

Speeds of up to 54 Mbps, small coverage area and not interoperable with 802.11b and 802.11g

Unselect

Data rates ranging from 150 Mbps to 600 Mbps with a distance range of up to 70 m (230 feet)

Unselect

Speeds of up to 11 Mbps and it´s better able to penetrate building structures

Unselect

Speeds of up to 54 Mbps and backward compatible with 802.11b with reduced bandwidth capacity

Unselect

Question 89 of 103

90.

Which of the following WLAN authentication method uses the Advanced Encryption Standard (AES) for encryption?

Question 90 of 103

91. Which of the following are WLAN authentication methods?

Question 91 of 103

92.

Which ports are used by CAPWAP to stablish the control message tunnel and the data tunnel, respectively?

Question 92 of 103

93.

On which type of wireless deployment access points can switch client data traffic locally and perform client authentication locally when their connection to the controller is lost?

Question 93 of 103

94.

In a controller-based network architecture, the controller needs to communicate to the networking devices.
What is the name of the interface between the controller and those devices?

Question 94 of 103

95.

The SDN solution architecture has three layers. Which of the following protocols run in the Control Plane layer?

Question 95 of 103

96.

Which Cisco DNA solution enables network access in minutes for any user or device to any application without compromising security?

Question 96 of 103

97.

Your company want to reduce costs by replacing current MPLS solution by internet links using VPN to connect the locations.
Since you have 9 locations which must connect each other, which of the following is the best solution in this case?
All the locations have Cisco routers and they will not be replaced at this time.

Question 97 of 103

98.

Which of the following is a VPN type with which, users can access the private networks over internet remotely?

Question 98 of 103

99.

Which command configures the router to act as a Relay Agent for DHCP?

Question 99 of 103

100.

Which of the following option can be used to create the following DHCP scope:

IP pool range: 10.10.1.20 - 10.10.1.200Default Gateway: 10.10.1.1Mask: 255.255.255.0TFTP Server: 192.168.10.10DNS: 10.10.10.10 10.10.10.11

Question 100 of 103

101. Considering the following script:

jsonWhich data format was used to write the code above?

Question 101 of 103

102.

Which of the following agentless automation tool uses SSH to connect to the network devices?

Question 102 of 103

103.

Which automation tool uses only a server-client architecture based in a pull deployment model, where the clients check regularly on the server if anything needs to be updated?

Question 103 of 103

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning