CCNA Exam 2020 Questions! Trivia Quiz

50 Questions | Total Attempts: 2889

SettingsSettingsSettings
CCNA Exam 2020 Questions! Trivia Quiz

If you have plans to become a network engineer or network administrator, you are expected to prove your skills and competence at one point, bypassing the CCNA exams. Are you looking for some CCNA exam 2020 questions to help you pass your exams? The quiz below is perfect for refreshing your memory on every topic you have covered.


Questions and Answers
  • 1. 
    Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?
    • A. 

      Source MAC: 00E0.FE91.7799Source IP: 192.168.1.1

    • B. 

      Source MAC: 00E0.FE10.17A3Source IP: 10.1.1.10

    • C. 

      Source MAC: 00E0.FE91.7799Source IP: 10.1.1.10

    • D. 

      Source MAC: 00E0.FE10.17A3Source IP: 192.168.1.1

    • E. 

      Source MAC: 00E0.FE91.7799Source IP: 10.1.1.1

  • 2. 
    What is the effect of configuring the ipv6 unicast-routing command on a router?
    • A. 

      To assign the router to the all-nodes multicast group

    • B. 

      To enable the router as an IPv6 router

    • C. 

      To permit only unicast packets on the router

    • D. 

      To prevent the router from joining the all-routers multicast group

  • 3. 
    What is a characteristic of a static route that creates a gateway of last resort?
    • A. 

      It backs up a route already discovered by a dynamic routing protocol.

    • B. 

      It uses a single network address to send multiple static routes to one destination address.

    • C. 

      It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.

    • D. 

      It is configured with a higher administrative distance than the original dynamic routing protocol has.

  • 4. 
    ​Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?
    • A. 

      S 10.17.2.0/24 [1/0] via 10.16.2.2

    • B. 

      S 0.0.0.0/0 [1/0] via 10.16.2.2

    • C. 

      C 10.16.2.0/24 is directly connected, Serial0/0/0

    • D. 

      S 10.17.2.0/24 is directly connected, Serial 0/0/0

  • 5. 
    ​Refer to the exhibit. Which command will properly configure an IPv6 static route on R2 that will allow traffic from PC2 to reach PC1 without any recursive lookups by router R2?
    • A. 

      R2(config)# ipv6 route 2001:db8:10:12::/64 2001:db8:32::1

    • B. 

      R2(config)# ipv6 route 2001:db8:10:12::/64 S0/0/0

    • C. 

      R2(config)# ipv6 route ::/0 2001:db8:32::1

    • D. 

      R2(config)# ipv6 route 2001:db8:10:12::/64 S0/0/1

  • 6. 
    A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network?
    • A. 

      Ip route 172.16.0.0 255.255.240.0 S0/0/0 200

    • B. 

      Ip route 172.16.32.0 255.255.224.0 S0/0/0 200

    • C. 

      Ip route 172.16.0.0 255.255.224.0 S0/0/0 100

    • D. 

      Ip route 172.16.32.0 255.255.0.0 S0/0/0 100

  • 7. 
    • A. 

      The network prefix is incorrect.

    • B. 

      The destination network is incorrect.

    • C. 

      The interface is incorrect.

    • D. 

      The next hop address is incorrect.

  • 8. 
    Which statement describes a route that has been learned dynamically?
    • A. 

      It is automatically updated and maintained by routing protocols.

    • B. 

      It is unaffected by changes in the topology of the network.

    • C. 

      It has an administrative distance of 1.

    • D. 

      It is identified by the prefix C in the routing table.

  • 9. 
    Compared with dynamic routes, what are two advantages of using static routes on a router? (
    • A. 

      They improve netw​ork security.

    • B. 

      They use fewer router resources.

    • C. 

      They improve the efficiency of discovering neighboring networks.

    • D. 

      They take less time to converge when the network topology changes.

    • E. 

      They automatically switch the path to the destination network when the topology changes.

  • 10. 
    To enable RIP ​routing for a specific subnet, the configuration command network 172.16.64.32 was entered by the network administrator. What address, if any, appears in the running configuration file to identify this network?
    • A. 

      172.16.64.32

    • B. 

      172.16.64.0

    • C. 

      172.16.0.0

    • D. 

      No address is displayed.

  • 11. 
    ​Refer to the exhibit. What is the administrative distance value that indicates the route for R2 to reach the 10.10.0.0/16 network?
    • A. 

      110

    • B. 

      1

    • C. 

      782

    • D. 

      0

  • 12. 
    • A. 

      A level 1 child route

    • B. 

      A level 1 parent route

    • C. 

      A level 1 ultimate route

    • D. 

      A level 2 supernet route

  • 13. 
    Which two factors are important when deciding which interior gateway ​routing protocol to use?
    • A. 

      Scalability

    • B. 

      ISP selection

    • C. 

      Speed of convergence

    • D. 

      The autonomous system that is used

    • E. 

      Campus backbone architecture

  • 14. 
    Employees of a company connect their wireless laptop computers to the enterprise LAN via wireless access points that are cabled to the Ethernet ports of switches. At which layer of the three-layer hierarchical network design model do these switches operate?
    • A. 

      Distribution

    • B. 

      Data link

    • C. 

      Physical

    • D. 

      Access

    • E. 

      Core

  • 15. 
    • A. 

      A network design where the access and core layers are collapsed into a single layer

    • B. 

      A collapsed core network design

    • C. 

      A three-tier campus network design where the access, distribution, and core are all separate layers, each one with very specific functions

    • D. 

      A network design where the access and distribution layers are collapsed into a single layer

  • 16. 
    • A. 

      The destination MAC address and the incoming port

    • B. 

      The destination MAC address and the outgoing port

    • C. 

      The source and destination MAC addresses and the incoming port

    • D. 

      The source and destination MAC addresses and the outgoing port

    • E. 

      The source MAC address and the incoming port

    • F. 

      The source MAC address and the outgoing port

  • 17. 
    Which advantage does the store-and-forward switching method have compared with the cut-through switching method?
    • A. 

      Collision detecting

    • B. 

      Frame error checking

    • C. 

      Faster frame forwarding

    • D. 

      Frame forwarding using IPv4 Layer 3 and 4 information

  • 18. 
    Which characteristic describes cut-through switching?
    • A. 

      Error-free fragments are forwarded, so switching occurs with lower latency.

    • B. 

      Frames are forwarded without any error checking.

    • C. 

      Only outgoing frames are checked for errors.

    • D. 

      Buffering is used to support different Ethernet speeds.

  • 19. 
    What is a result of connecting two or more switches together?
    • A. 

      The number of broadcast domains is increased.

    • B. 

      The size of the broadcast domain is increased.

    • C. 

      The number of collision domains is reduced.

    • D. 

      The size of the collision domain is increased.

  • 20. 
    In what situation would a Layer 2 switch have an IP address configured?
    • A. 

      When the Layer 2 switch needs to forward user traffic to another device

    • B. 

      When the Layer 2 switch is the default gateway of user traffic

    • C. 

      When the Layer 2 switch needs to be remotely managed

    • D. 

      When the Layer 2 switch is using a routed port

  • 21. 
    A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task?
    • A. 

      IP address

    • B. 

      VTP domain

    • C. 

      Vty lines

    • D. 

      Default VLAN

    • E. 

      Default gateway

    • F. 

      Loopback address

  • 22. 
    As part of the new security policy, all switches on the network are configured to automatically learn MAC addresses for each port. All running configurations are saved at the start and close of every business day. A severe thunderstorm causes an extended power outage several hours after the close of business. When the switches are brought back online, the dynamically learned MAC addresses are retained. Which port security configuration enabled this?
    • A. 

      Auto secure MAC addresses

    • B. 

      Dynamic secure MAC addresses

    • C. 

      Static secure MAC addresses

    • D. 

      Sticky secure MAC addresses

  • 23. 
    A network administrator is configuring port security on a Cisco switch. When a violation occurs, which violation mode that is configured on an interface will cause packets with an unknown source address to be dropped with no notification sent?
    • A. 

      Off

    • B. 

      Restrict

    • C. 

      Protect

    • D. 

      Shutdown

  • 24. 
    Which commands are used to re-enable a port that has been disabled as a result of a port security violation?
    • A. 

      Shutdownno shutdown

    • B. 

      Shutdownno switchport port-security

    • C. 

      Shutdownno switchport port-security violation shutdown

    • D. 

      Shutdownno switchport port-security maximum

  • 25. 
    Which two characteristics describe the native VLAN?
    • A. 

      Designed to carry traffic that is generated by users, this type of VLAN is also known as the default VLAN.

    • B. 

      The native VLAN traffic will be untagged across the trunk link.

    • C. 

      This VLAN is necessary for remote management of a switch.

    • D. 

      High priority traffic, such as voice traffic, uses the native VLAN.

    • E. 

      The native VLAN provides a common identifier to both ends of a trunk.