CCNA Flashcards
Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)
A. site-to-site VPN
B. IDMVPN
C. IGETVPN
D. IPsec remote access
E. clientless VPN
IDMVPN & clientless VPN
What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?
A. SMTP
B. SNMP
C. TCP
D. FTP
SNMP
How does encryption project the wireless network?
A. via integrity checks to identify wireless forgery attacks in the frame
B. via specific ciphers to detect and prevent zero-day network attacks
C. via an algorithm to change wireless data so that only the access point and client understand it
D. via a policy to prevent unauthorized users from communicating on the wireless network
via an algorithm to change wireless data so that only the access point and client understand it
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the point to learn the MAC address of the printer and insert it into the table automatically?
A. enable dynamic MAC address learning
B. implement static MAC addressing
C. enable sticky MAC addressing
D. implement auto MAC address learning
enable sticky MAC addressing
What occurs to frames during the process of frame flooding?
A. Frames are sent to every port on the witch in the same VLAN except the originating port
B. Frames are sent to every port on the switch that has a matching entry in the MAC address table
C. Frames are sent to all ports, including those that are assigned to other VLANs
D. Frames are sent to every port on the switch in the same VLAN
Frames are sent to every port on the switch in the same VLAN except the originating port
Which type of network attacks overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?
A. SYIM flood
B. reflection
C. teardrop
D. amplification
SYIM flood
What is the difference between IPv6 unicast and anycast addressing?
A. IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration
B. IPv6unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration
C. An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.
D. Unlike an IPv6 anycast address, and IPV6 unicast address is assigned to a group of interfaces on multiple nodes.
An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
A. No router ID is set, and the OSPF protocol doesn’t run.
B The highest up/up physical interface IP address is selected as the router ID
C. The lowest IP address is incremented by 1 and selected as the router ID
D. The router ID 0.0.0.0 is selected and placed in the OSPF process
The highest up/up physical interface IP address is selected as the router ID
Which two IPv6 addresses are used to provide connectivity between two routers on a shared link? (Choose two.)
A. FF02::0001:FF00:0000/104
B. ff06:bb43:cc13:dd16:1bb:ff14:7545:234d
C. 2002::512:1204b:1111::1/64
D. 2001:701:104b:1111::1/64
E. ::ffff:10.14.101.1/96
2002::512:1204b:1111::1/64
2001:701:104b:1111::1/64
If a notice-level messaging is sent to a syslog server, which event has occurred?
A. A network device has restarted
B. An ARP inspection has failed
C. A routing instance has flapped
D. A debug operation is running
A routing instance has flapped
What benefit does controller-based networking provide versus traditional networking?
A. moves from a two-tier to a three-tier network architecture to provide maximum redundancy
B. provides an added layer of security to protect from DDoS attacks
C. allows configuration and monitoring of the network from one centralized port
D. combines control and data plane functionality on a single device to minimize latency
allows configuration and monitoring of the network from one centralized port
Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?
A. 802.1x
B. IP Source Guard
C. MAC Authentication Bypass
D. 802.11n
802.1x
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
A. dual algorithm
B. metric
C. administrative distance
D. hop count
administrative distance
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
A. dual algorithm
B. metric
C. administrative distance
D. hop count
administrative distance
Which two components comprise part of a PKI?
A. preshared key that authenticates connections
B. RSA token
C. CA that grants certificates
D. clear-text password that authenticates connections
E. one or more CRLs
RSA token & CA that grants certificates