CCNA Flashcards

1
Q

Which CRUD operation corresponds to the HTTP GET method?

A.create
B.update
C.delete
D.read

A

Read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A network administrator must enable DHCP services between two sites. What must be configured for the router to pass DHCPDISCOVER messages on to the server?

A.DHCP Snooping
B.a DHCP Pool
C.DHCP Binding
D.a DHCP Relay Agent

A

a DHCP Relay Agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two)

A.listening
B.blocking
C.speaking
D.learning
E.forwarding

A

learning
forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With REST API, which standard HTTP header tells a server which media type is expected by the client?

A.Content-Type: application/json; charset=utf-8
B.Accept-Patch: text/example; charset=utf-8
C.Accept: application/json
D.Accept-Encoding: gzip, deflate

A

Accept: application/json

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a role of wireless controllers in an enterprise network?

A.provide secure user logins to devices on the network
B.centralize the management of access points in an enterprise network
C.support standalone or controller-based architectures
D.serve as the first line of defense in an enterprise network

A

centralize the management of access points in an enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which device controls the forwarding of authentication requests for users when connecting to the network using a lightweight access point?

A.wireless LAN controller
B.RADIUS server
C.TACACS server
D.wireless access point

A

wireless LAN controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Drag and drop the SNMP manager and agent identifier commands from the left onto the functions on the right.

Note: You just need to click on one of the boxes on the right to match it with the corresponding box on the left.

-show snmp group
-show snmp community
-show snmp chassis
-show snmp engineID
-show snmp host

A

show snmp group: displays the SNMP security model in use
+ show snmp community: displays the SNMP access string
+ show snmp chassis: displays the SNMP server serial number
+ show snmp engineID: displays the IP address of the remote SNMP device
+ show snmp host: displays information about the SNMP recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Refer to the exhibit. PC1 is trying to ping PC3 for the first time and sends out an ARP to S1. Which action is taken by S1?

A.It drops the frame
B.It forwards it out interface G0/2 only
C.It forwards it out G0/3 only
D.It is flooded out every port except G0/0

A

It is flooded out every port except G0/0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on
another switch. What must be configured when using active mode on both sides of the connection?

A.802.1q trunks
B.Cisco vPC
C.LLDP
D.LACP

A

LACP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?

A.The ISP requires the new subnet to be advertised to the internet for web services.
B.There is limited unique address space, and traffic on the new subnet will stay local within the organization.
C.Traffic on the subnet must traverse a site-to-site VPN to an outside organization.
D.The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.

A

There is limited unique address space, and traffic on the new subnet will stay local within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which two QoS tools are used to guarantee minimum bandwidth to certain traffic? (Choose two)

A.WFQ
B.CBWFQ
C.RSVP
D.LLC
E.FIFO

A

A.WFQ
B.CBWFQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?

A.physical access control
B.intrusion detection
C.user awareness
D.network authorization

A

.physical access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do servers connect to the network in a virtual environment?

A.wireless to an access point that is physically connected to the network
B.a cable connected to a physical switch on the network
C.a software switch on a hypervisor that is physically connected to the network
D.a virtual switch that links to an access point that is physically connected to the network

A

a software switch on a hypervisor that is physically connected to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which device tracks the state of active connections in order to make a decision to forward a packet through?

A.router
B.wireless LAN controller
C.wireless access point
D.firewall

A

.firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An engineer needs to add an old switch back into a network. To prevent the switch from corrupting the VLAN database which action must be taken?

A.Add the switch in the VTP domain with a lower revision number
B.Add the switch in the VTP domain with a higher revision number
C.Add the switch with DTP set to desirable
D.Add the switch with DTP set to dynamic desirable

A

Add the switch in the VTP domain with a lower revision number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which two protocols are supported on service-port interfaces? (Choose two)

A.SCP
B.RADIUS
C.TACACS+
D.SSH
E.Telnet

A

SSH
Telnet

17
Q

Which WLC port connects to a switch to pass normal access-point traffic?

A.console
B.distribution system
C.redundancy
D.service

A

Distribution System

18
Q

Refer to the exhibit.

SiteA#show interface TenGigabitEthernet0/1/0
TenGigabitEthernet0/1/0 is up, line protocol is up
Hardware is BUILT-IN-EPA-8x10G, address is aabb.cc00.0100 (bia aabb.cc00.0100)
Description: Connection to SiteB
Internet address is 10.10.10.1/30
MTU 8146 bytes, BW 10000000 Kbit/sec, DLY 10 usec,
reliability 166/255, txload 1/255, rxload 1/255
Full Duplex, 10000Mbps, link type is force-up, media type is SFP-LR
5 minute input rate 265746000 bits/sec, 24343 packets/sec
5 minute output rate 123245000 bits/sec, 12453 packets/sec

SiteB#show interface TenGigabitEthernet0/1/0
TenGigabitEthernet0/1/0 is up, line protocol is up
Hardware is BUILT-IN-EPA-8x10G, address is 0000.0c00.750c (bia 0000.0c00.750c)
Description: Connection to SiteA
Internet address is 10.10.10.2/30
MTU 8146 bytes, BW 10000000 Kbit/sec, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Full Duplex, 10000Mbps, link type is force-up, media type is SFP-LR
5 minute input rate 123245000 bits/sec, 15343 packets/sec
5 minute output rate 265746000 bits/sec, 12453 packets/sec
Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent connectivity issue?

A

Interface errors are incrementing

19
Q

Which two QoS tools provides congestion management? (Choose two)

A

CBWFQ
PQ

20
Q

What describes the operation of virtual machines?

A.Virtual machines are responsible for managing and allocating host hardware resources
B.In a virtual machine environment, physical servers must run one operating system at a time
C.Virtual machines are operating system instances that are decoupled from server hardware
D.Virtual machines are the physical hardware that support a virtual environment

A

Virtual machines are operating system instances that are decoupled from server hardware

21
Q

What is the function of a hub-and-spoke WAN topology?

A

allows access restrictions to be implemented between subscriber sites

22
Q

Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right.

-Supports a maximum data rate of 11 Mbps

-Operates in the 5 GHz band only and supports a maximum data rate of 54 Mbps

-Operates in the 5 GHz band only and supports a maximum data rate that can exceed 100 Mbps

-Operates in the 2.4 GHz and 5 GHz bands

-Operates in the 2.4 GHz band only and supports a maximum data rate of 54 Mbps

A

+ 802.11b: Supports a maximum data rate of 11 Mbps
+ 802.11a: Operates in the 5 GHz band only and supports a maximum data rate of 54 Mbps
+ 802.11ac: Operates in the 5 GHz band only and supports a maximum data rate that can exceed 100 Mbps
+ 802.11n: Operates in the 2.4 GHz and 5 GHz bands
+ 802.11g: Operates in the 2.4 GHz band only and supports a maximum data rate of 54 Mbps

23
Q

Which technology allows for multiple operating systems to be run on a single host computer?

A.virtual device contexts
B.server virtualization
C.network port ID visualization
D.virtual routing and forwarding

A

server virtualization

24
Q

Which JSON data type is an unordered set of attribute-value pairs?

A.object
B.array
C.Boolean
D.string

A

Object

25
Q

Which global command encrypts all passwords in the running configuration?

A.enable secret
B.service password-encryption
C.enable password-encryption
D.password-encrypt

A

Secret Password Ecryption

26
Q

An engineering team asks an implementer to configure syslog for warning conditions and error conditions. Which command does the implementer configure to achieve the desired result?

A.logging trap 3
B.logging trap 2
C.logging trap 5
D.logging trap 4

A

Logging trap 4

27
Q

What is a role of access points in an enterprise network?

A.integrate with SNMP in preventing DDoS attacks
B.support secure user logins to devices or the network
C.serve as a first line of defense in an enterprise network
D.connect wireless devices to a wired network

A

connect wireless devices to a wired network

28
Q

What occurs when overlapping Wi-Fi channels are implemented?

A.Users experience poor wireless network performance
B.Network communications are open to eavesdropping
C.The wireless network becomes vulnerable to unauthorized access
D.Wireless devices are unable to distinguish between different SSIDs

A

Users experience poor wireless network performance

29
Q
A