CCNA Flashcards
Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)
A. site-to-site VPN
B. IDMVPN
C. IGETVPN
D. IPsec remote access
E. clientless VPN
IDMVPN & clientless VPN
What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?
A. SMTP
B. SNMP
C. TCP
D. FTP
SNMP
How does encryption project the wireless network?
A. via integrity checks to identify wireless forgery attacks in the frame
B. via specific ciphers to detect and prevent zero-day network attacks
C. via an algorithm to change wireless data so that only the access point and client understand it
D. via a policy to prevent unauthorized users from communicating on the wireless network
via an algorithm to change wireless data so that only the access point and client understand it
A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the point to learn the MAC address of the printer and insert it into the table automatically?
A. enable dynamic MAC address learning
B. implement static MAC addressing
C. enable sticky MAC addressing
D. implement auto MAC address learning
enable sticky MAC addressing
What occurs to frames during the process of frame flooding?
A. Frames are sent to every port on the witch in the same VLAN except the originating port
B. Frames are sent to every port on the switch that has a matching entry in the MAC address table
C. Frames are sent to all ports, including those that are assigned to other VLANs
D. Frames are sent to every port on the switch in the same VLAN
Frames are sent to every port on the switch in the same VLAN except the originating port
Which type of network attacks overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?
A. SYIM flood
B. reflection
C. teardrop
D. amplification
SYIM flood
What is the difference between IPv6 unicast and anycast addressing?
A. IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration
B. IPv6unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration
C. An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.
D. Unlike an IPv6 anycast address, and IPV6 unicast address is assigned to a group of interfaces on multiple nodes.
An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
A. No router ID is set, and the OSPF protocol doesn’t run.
B The highest up/up physical interface IP address is selected as the router ID
C. The lowest IP address is incremented by 1 and selected as the router ID
D. The router ID 0.0.0.0 is selected and placed in the OSPF process
The highest up/up physical interface IP address is selected as the router ID
Which two IPv6 addresses are used to provide connectivity between two routers on a shared link? (Choose two.)
A. FF02::0001:FF00:0000/104
B. ff06:bb43:cc13:dd16:1bb:ff14:7545:234d
C. 2002::512:1204b:1111::1/64
D. 2001:701:104b:1111::1/64
E. ::ffff:10.14.101.1/96
2002::512:1204b:1111::1/64
2001:701:104b:1111::1/64
If a notice-level messaging is sent to a syslog server, which event has occurred?
A. A network device has restarted
B. An ARP inspection has failed
C. A routing instance has flapped
D. A debug operation is running
A routing instance has flapped
What benefit does controller-based networking provide versus traditional networking?
A. moves from a two-tier to a three-tier network architecture to provide maximum redundancy
B. provides an added layer of security to protect from DDoS attacks
C. allows configuration and monitoring of the network from one centralized port
D. combines control and data plane functionality on a single device to minimize latency
allows configuration and monitoring of the network from one centralized port
Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?
A. 802.1x
B. IP Source Guard
C. MAC Authentication Bypass
D. 802.11n
802.1x
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
A. dual algorithm
B. metric
C. administrative distance
D. hop count
administrative distance
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?
A. dual algorithm
B. metric
C. administrative distance
D. hop count
administrative distance
Which two components comprise part of a PKI?
A. preshared key that authenticates connections
B. RSA token
C. CA that grants certificates
D. clear-text password that authenticates connections
E. one or more CRLs
RSA token & CA that grants certificates
What are two similarities between UTP Cat 5e and Cat 6a cabling?
A. Both operate at a frequency of 500 MHz.
B. Both support runs of up to 55 meters.
C. Both support runs of up to 100 meters.
D. Both support speeds of at least 1 Gigabit.
E. Both support speeds up to 10 Gigabit.
Both support runs of up to 100 meters
Both support speeds of at least 1 Gigabit
In which two ways does a password manager reduce the chance of a hacker stealing a user’s password?
A. It automatically provides a second authentication factor that is unknown to the original user
B. It uses an internal firewall to protect the password repository from unauthorized access
C. It protects against keystroke logging on a compromised device or website
D. It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
E. It encourages users to create stronger passwords
It protects against keystroke logging on a compromised device or website
It encourages users to create stronger passwords
What is the role of a firewall in an enterprise network?
A. Forwards packets based on stateless packet inspection
B. Processes unauthorized packets and allows passage to less secure segments of the network
C. determines which packets are allowed to cross from unsecured to secured networks
D. explicitly denies all packets from entering an administrative domain
determines which packets are allowed to cross from unsecured to secured networks
What are two protocols within the IPsec suite?
A. AH
B. 3DES
C. ESP
D. TLS
E. AES
AH & ESP
Which two features introduced in SNMPv2 provide the ability to retrieve large amounts of data in one request?
A. Get
B. GetNext
C. Set
D. GetBulk
E. Inform
Get & Inform
A Cisco engineer at a new branch office in configuring a wireless network with access points that connect to a controller that is based at corporate headquarters. Wireless client traffic must terminate at the branch office and access-point survivability is required in the event of a WAN outage. Which access point mode must be selected?
A. Lightweight with local switching disabled
B. Local with AP fallback enabled
C. OfficeExtend with high availability disabled
D. FlexConnect with local switching enabled
FlexConnect with local switching enabled
Which two practices are recommended for an acceptable security posture in a network?
A. Backup device configurations to encrypted USB drives for secure retrieval
B. Maintain network equipment in a secure location
C. Use a cryptographic keychain to authenticate network devices
D. Place internal email and file servers in a designated DMZ
E. Disabled unused or unnecessary ports, interface, and services
Maintain network equipment in a secure location
Disable unused or unnecessary port, interfaces, and services
A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to 12:00 AM which command should be used?
A. Clock timezone
B. Clock summer-time-recurring
C. Clock summer-time date
D. Clock set
clock set
What are two differences between optical-fiber cabling and copper cabling?
A. Light is transmitted through the core of the fiber
B. A BNC connector is used for fiber connections
C. The glass core component is encased in a cladding
D. Fiber connects to physical interfaces using Rj-45 connections
E. The data can pass through the cladding
Light is transmitted through the core of the fiber
The glass core component is encased in a cladding
What are network endpoints?
A. act as routers to connect a user to the service prowler network
B. a threat to the network if they are compromised
C. support inter-VLAN connectivity
D. enforce policies for campus-wide traffic going to the internet
A threat to the network if they are compromised
Which interface enables communication between a program on the controller and a program on the networking devices?
A. Northbound Interface
B. Software Virtual Interface
C. Southbound Interface
D. Tunnel Interface
Southbound Interface
Which type of organization should use a collapsed-core architecture?
A. large and requires a flexible, scalable network design
B. large and must minimize downtime when hardware fails
C. small and needs to reduce networking costs currently
D. small but is expected to grow dramatically in the near future
small but needs to reduce networking costs currently
Which purpose does a northbound API serve in a controller-based network hardware?