If you have plans to become a network engineer or network administrator, you are expected to prove your skills and competence at one point, bypassing the CCNA exams. Are you looking for some CCNA exam 2020 questions to help you pass your exams? The quiz below is perfect for refreshing your memory on every topic you have covered.
To assign the router to the all-nodes multicast group
To enable the router as an IPv6 router
To permit only unicast packets on the router
To prevent the router from joining the all-routers multicast group
Rate this question:
It backs up a route already discovered by a dynamic routing protocol.
It uses a single network address to send multiple static routes to one destination address.
It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.
It is configured with a higher administrative distance than the original dynamic routing protocol has.
Rate this question:
S 10.17.2.0/24 [1/0] via 10.16.2.2
S 0.0.0.0/0 [1/0] via 10.16.2.2
C 10.16.2.0/24 is directly connected, Serial0/0/0
S 10.17.2.0/24 is directly connected, Serial 0/0/0
Rate this question:
R2(config)# ipv6 route 2001:db8:10:12::/64 2001:db8:32::1
R2(config)# ipv6 route 2001:db8:10:12::/64 S0/0/0
R2(config)# ipv6 route ::/0 2001:db8:32::1
R2(config)# ipv6 route 2001:db8:10:12::/64 S0/0/1
Rate this question:
Ip route 172.16.0.0 255.255.240.0 S0/0/0 200
Ip route 172.16.32.0 255.255.224.0 S0/0/0 200
Ip route 172.16.0.0 255.255.224.0 S0/0/0 100
Ip route 172.16.32.0 255.255.0.0 S0/0/0 100
Rate this question:
The network prefix is incorrect.
The destination network is incorrect.
The interface is incorrect.
The next hop address is incorrect.
Rate this question:
It is automatically updated and maintained by routing protocols.
It is unaffected by changes in the topology of the network.
It has an administrative distance of 1.
It is identified by the prefix C in the routing table.
Rate this question:
They improve network security.
They use fewer router resources.
They improve the efficiency of discovering neighboring networks.
They take less time to converge when the network topology changes.
They automatically switch the path to the destination network when the topology changes.
Rate this question:
172.16.64.32
172.16.64.0
172.16.0.0
No address is displayed.
Rate this question:
110
1
782
0
Rate this question:
A level 1 child route
A level 1 parent route
A level 1 ultimate route
A level 2 supernet route
Rate this question:
Scalability
ISP selection
Speed of convergence
The autonomous system that is used
Campus backbone architecture
Rate this question:
Distribution
Data link
Physical
Access
Core
Rate this question:
A network design where the access and core layers are collapsed into a single layer
A collapsed core network design
A three-tier campus network design where the access, distribution, and core are all separate layers, each one with very specific functions
A network design where the access and distribution layers are collapsed into a single layer
Rate this question:
The destination MAC address and the incoming port
The destination MAC address and the outgoing port
The source and destination MAC addresses and the incoming port
The source and destination MAC addresses and the outgoing port
The source MAC address and the incoming port
The source MAC address and the outgoing port
Rate this question:
Collision detecting
Frame error checking
Faster frame forwarding
Frame forwarding using IPv4 Layer 3 and 4 information
Rate this question:
Error-free fragments are forwarded, so switching occurs with lower latency.
Frames are forwarded without any error checking.
Only outgoing frames are checked for errors.
Buffering is used to support different Ethernet speeds.
Rate this question:
The number of broadcast domains is increased.
The size of the broadcast domain is increased.
The number of collision domains is reduced.
The size of the collision domain is increased.
Rate this question:
When the Layer 2 switch needs to forward user traffic to another device
When the Layer 2 switch is the default gateway of user traffic
When the Layer 2 switch needs to be remotely managed
When the Layer 2 switch is using a routed port
Rate this question:
IP address
VTP domain
Vty lines
Default VLAN
Default gateway
Loopback address
Rate this question:
Auto secure MAC addresses
Dynamic secure MAC addresses
Static secure MAC addresses
Sticky secure MAC addresses
Rate this question:
Off
Restrict
Protect
Shutdown
Rate this question:
Shutdownno shutdown
Shutdownno switchport port-security
Shutdownno switchport port-security violation shutdown
Shutdownno switchport port-security maximum
Rate this question:
Designed to carry traffic that is generated by users, this type of VLAN is also known as the default VLAN.
The native VLAN traffic will be untagged across the trunk link.
This VLAN is necessary for remote management of a switch.
High priority traffic, such as voice traffic, uses the native VLAN.
The native VLAN provides a common identifier to both ends of a trunk.
Rate this question:
User-generated
Tagged
Untagged
Management
Rate this question:
These VLANs are default VLANs that cannot be removed.
These VLANs cannot be deleted unless the switch is in VTP client mode.
These VLANs can only be removed from the switch by using the no vlan 10 and no vlan 100 commands.
Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.
Rate this question:
The access interfaces do not have IP addresses and each should be configured with an IP address.
The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.
The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate.
The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.
Rate this question:
172.16.20.2
172.16.26.254
172.16.36.255
172.16.48.5
Rate this question:
Access-class 5 in
Access-list 5 deny any
Access-list standard VTYpermit 10.7.0.0 0.0.0.127
Access-list 5 permit 10.7.0.0 0.0.0.31
Ip access-group 5 out
Ip access-group 5 in
Rate this question:
Access-group 11 in
Access-class 11 in
Access-list 11 in
Access-list 110 in
Rate this question:
Ip dhcp excluded-address 192.168.100.1 192.168.100.10ip dhcp excluded-address 192.168.100.254ip dhcp pool LAN-POOL-100network 192.168.100.0 255.255.255.0ip default-gateway 192.168.100.1
Ip dhcp excluded-address 192.168.100.1 192.168.100.10ip dhcp excluded-address 192.168.101.254ip dhcp pool LAN-POOL-100network 192.168.100.0 255.255.254.0default-router 192.168.100.1
Dhcp pool LAN-POOL-100ip dhcp excluded-address 192.168.100.1 192.168.100.9ip dhcp excluded-address 192.168.100.254network 192.168.100.0 255.255.254.0default-router 192.168.101.1
Ip dhcp excluded-address 192.168.100.1 192.168.100.9ip dhcp excluded-address 192.168.101.254ip dhcp pool LAN-POOL-100ip network 192.168.100.0 255.255.254.0ip default-gateway 192.168.100.1
Rate this question:
A DHCP server must be installed on the same LAN as the host that is receiving the IP address.
R1 is not configured as a DHCPv4 server.
The ip address dhcp command was not issued on the interface Gi0/1.
The ip helper-address command was applied on the wrong interface.
Rate this question:
The MAC address of the IPv6 enabled interface
A randomly generated 64-bit hexadecimal address
An IPv6 address that is provided by a DHCPv6 server
An IPv4 address that is configured on the interface
Rate this question:
Ipv6 unicast-routing
Dns-server 2001:DB8:8::8
Ipv6 dhcp server LAN1
Ipv6 nd other-config-flag
Prefix-delegation 2001:DB8:8::/48 00030001000E84244E70
Rate this question:
10.130.5.76
209.165.200.245
203.0.113.5
172.16.1.10
192.0.2.1
209.165.200.226
Rate this question:
Telnet
IPsec
HTTP
ICMP
DNS
Rate this question:
An IPv4 address pool
An ACL to identify the local IPv4 address of the web server
The keyword overload for the ip nat inside source command
The ip nat inside source command to link the inside local and inside global addresses
Rate this question:
Access-list 1 permit 10.0.0.0 0.255.255.255ip nat inside source list 1 interface serial 0/0/0 overload
Access-list 1 permit 10.0.0.0 0.255.255.255ip nat pool comp 192.168.2.1 192.168.2.8 netmask 255.255.255.240ip nat inside source list 1 pool comp
Access-list 1 permit 10.0.0.0 0.255.255.255ip nat pool comp 192.168.2.1 192.168.2.8 netmask 255.255.255.240ip nat inside source list 1 pool comp overload
Access-list 1 permit 10.0.0.0 0.255.255.255ip nat pool comp 192.168.2.1 192.168.2.8 netmask 255.255.255.240ip nat inside source list 1 pool comp overloadip nat inside source static 10.0.0.5 209.165.200.225
Rate this question:
It allows sites to use private IPv6 addresses and translates them to global IPv6 addresses.
It allows sites to connect multiple IPv4 hosts to the Internet via the use of a single public IPv4 address.
It allows sites to connect IPv6 hosts to an IPv4 network by translating the IPv6 addresses to IPv4 addresses.
It allows sites to use private IPv4 addresses, and thus hides the internal addressing structure from hosts on public IPv4 networks.
Rate this question:
The NAT pool has been exhausted.
The wrong netmask was used on the NAT pool.
Access-list 1 has not been configured properly.
The inside and outside interfaces have been configured backwards.
Rate this question:
Show ip protocols
Show ip interface
Show cdp neighbors
Show port-security
Show mac-address-table
Rate this question:
The NTP master will claim to be synchronized at the configured stratum number.
The NTP master will be the clock with 1 as its stratum number.
An NTP server with a higher stratum number will become the master.
Other systems will be willing to synchronize to that master using NTP.
The NTP master will lower its stratum number.
Rate this question:
System messages will be forwarded to the number following the logging trap argument.
System messages that exist in levels 4-7 must be forwarded to a specific logging server.
System messages that match logging levels 0-4 will be forwarded to a specified logging device.
System messages will be forwarded using a SNMP version that matches the argument that follows the logging trap command.
Rate this question:
This is a notification message for a normal but significant condition.
This is an alert message for which immediate action is needed.
This is an error message for which warning conditions exist.
This is an error message that indicates the system is unusable.
Rate this question:
A maintenance deployment release
A minor release
A mainline release
An extended maintenance release
Rate this question:
25574400 bytes
249856000 bytes
221896413 bytes
33591768 bytes
Rate this question:
Because there is a cabling problem on VLAN 99
Because VLAN 99 is not a valid management VLAN
Because VLAN 1 is up and there can only be one management VLAN on the switch
Because VLAN 99 needs to be entered as a VLAN under an interface before it can become an active interface
Because the VLAN 99 has not been manually entered into the VLAN database with the vlan 99 command
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.