Ccna2 Final Exam (New Questions)

44 Questions | Total Attempts: 542

SettingsSettingsSettings
Ccna2 Final Exam (New Questions)

All the questions and answers for the CCNA2 Final Exam can be found on ccna5. Net. Their quiz only covers the first 58 questions, for the other 44 questions listed under "new questions", this quiz was made. If you combine both quizzes, you'll have around 100 questions in total. 58 questions quiz: https://www. Ccna5. Net/ccna-2-rs-routing-and-switching-essentials-final- exam


Questions and Answers
  • 1. 
    A network technician has been asked to secure all switches in the campus network. The security requirements are for each switch to automatically learn and add MAC addresses to both the address table and the running configuration. Which port security configuration will meet these requirements?
    • A. 

      Auto secure MAC addresses

    • B. 

      Dynamic secure MAC addresses

    • C. 

      Static secure MAC addresses

    • D. 

      Sticky secure MAC addresses

  • 2. 
    Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.)
    • A. 

      Dynamic desirable – dynamic auto

    • B. 

      Dynamic auto – dynamic auto

    • C. 

      Access – dynamic auto

    • D. 

      Dynamic desirable – dynamic desirable

    • E. 

      Access – trunk

    • F. 

      Dynamic desirable – trunk*

  • 3. 
    Fill in the blank.The OSPF Type 1 packet is the [Blank] packet.
  • 4. 
    Which value represents the “trustworthiness” of a route and is used to determine which route to install into the routing table when there are multiple routes toward the same destination?
    • A. 

      Routing protocol

    • B. 

      Outgoing interface

    • C. 

      Metric

    • D. 

      Administrative distance

  • 5. 
    Refer to the exhibit. What is the OSPF cost to reach the R2 LAN 172.16.2.0/24 from R1?
    • A. 

      782

    • B. 

      74

    • C. 

      128

    • D. 

      65

  • 6. 
    Fill in the blank.The default administrative distance for a static route is [Blank].
  • 7. 
    Fill in the blank.Static routes are configured by the use of the global configuration command [Blank]
  • 8. 
    Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?
    • A. 

      Router R3 will become the DR and router R1 will become the BDR.

    • B. 

      Router R1 will become the DR and router R2 will become the BDR.

    • C. 

      Router R4 will become the DR and router R3 will become the BDR

    • D. 

      Router R1 will become the DR and router R2 will become the BDR.

  • 9. 
    What is the purpose of an access list that is created as part of configuring IP address translation?
    • A. 

      The access list permits or denies specific addresses from entering the device doing the translation.

    • B. 

      The access list defines the private IP addresses that are to be translated

    • C. 

      The access list prevents external devices from being a part of the address translation.

    • D. 

      The access list defines the valid public addresses for the NAT or PAT pool.

  • 10. 
    • A. 

      -ip access-group 5 out

    • B. 

      -access-list standard VTY

    • C. 

      Permit 10.7.0.0 0.0.0.127

    • D. 

      -access-list 5 deny any

    • E. 

      -access-list 5 permit 10.7.0.0 0.0.0.31

    • F. 

      -ip access-group 5 in

    • G. 

      -access-class 5 in

  • 11. 
    While analyzing log files, a network administrator notices reoccurring native VLAN mismatches. What is the effect of these reoccurring errors?
    • A. 

      Unexpected traffic on the error-occurring trunk port is being received.

    • B. 

      All traffic on the error-occurring trunk port is being misdirected or dropped.

    • C. 

      All traffic on the error-occurring trunk port is being switched correctly regardless of the error.

    • D. 

      The control and management traffic on the error-occurring trunk port is being misdirected or dropped.

  • 12. 
    • A. 

      The native VLAN traffic will be untagged across the trunk link.

    • B. 

      High priority traffic, such as voice traffic, uses the native VLAN.

    • C. 

      This VLAN is necessary for remote management of a switch.

    • D. 

      The native VLAN provides a common identifier to both ends of a trunk.

    • E. 

      Designed to carry traffic that is generated by users, this type of VLAN is also known as the default VLAN.

  • 13. 
    • A. 

      Add the next hop neighbor address of 198.51.0.8.

    • B. 

      Change the administrative distance to 1.

    • C. 

      Change the destination network to 198.51.0.5.

    • D. 

      Change the administrative distance to 120.

  • 14. 
    Refer to the exhibit. An attacker on PC X sends a frame with two 802.1Q tags on it, one for VLAN 40 and another for VLAN 12. What will happen to this frame?
    • A. 

      SW-A will drop the frame because it is invalid.

    • B. 

      SW-A will remove both tags and forward the rest of the frame across the trunk link, where SW-B will forward the frame to hosts on VLAN 40.

    • C. 

      SW-A will leave both tags on the frame and send it to SW-B, which will forward it to hosts on VLAN 40.

    • D. 

      SW-A will remove the outer tag and send the rest of the frame across the trunk link, where SW-B will forward the frame to hosts on VLAN 12.

  • 15. 
    Which statement is true about the difference between OSPFv2 and OSPFv3?
    • A. 

      OSPFv3 routers use a different metric than OSPFv2 routers use.

    • B. 

      OSPFv3 routers do not need to elect a DR on multiaccess segments.

    • C. 

      OSPFv3 routers do not need to have matching subnets to form neighbor adjacencies.

    • D. 

      OSPFv3 routers use a 128 bit router ID instead of a 32 bit ID.

  • 16. 
    What are two ways of turning off DTP on a trunk link between switches? (Choose two.)
    • A. 

      Change the native VLAN on both ports.

    • B. 

      Configure attached switch ports with the nonegotiate command option.

    • C. 

      Configure attached switch ports with the dynamic desirable command option.

    • D. 

      Configure one port with the dynamic auto command option and the opposite attached switch port with the dynamic desirable command option.

    • E. 

      Place the two attached switch ports in access mode.

  • 17. 
    Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?
    • A. 

      To determine if the switch is forwarding the broadcast traffic correctly

    • B. 

      To determine which ports are functioning

    • C. 

      To determine which ports are not correctly configured to prevent MAC address flooding

    • D. 

      To determine when the CAM table size needs to be increased in order to prevent overflows

  • 18. 
    A new network policy requires an ACL to deny HTTP access from all guests to a web server at the main office. All guests use addressing from the IPv6 subnet 2001:DB8:19:C::/64. The web server is configured with the address 2001:DB8:19:A::105/64. Implementing the NoWeb ACL on the interface for the guest LAN requires which three commands? (Choose three.)
    • A. 

      Permit tcp any host 2001:DB8:19:A::105 eq 80

    • B. 

      Deny tcp host 2001:DB8:19:A::105 any eq 80

    • C. 

      Deny tcp any host 2001:DB8:19:A::105 eq 80

    • D. 

      Permit ipv6 any any

    • E. 

      Deny ipv6 any any

    • F. 

      Ipv6 traffic-filter NoWeb in

    • G. 

      Ip access-group NoWeb in

  • 19. 
    An OSPF router has three directly connected networks; 172.16.0.0/16, 172.16.1.0/16, and 172.16.2.0/16. Which OSPF network command would advertise only the 172.16.1.0 network to neighbors?
    • A. 

      Router(config-router)# network 172.16.1.0 0.0.255.255 area 0

    • B. 

      Router(config-router)# network 172.16.0.0 0.0.15.255 area 0

    • C. 

      Router(config-router)# network 172.16.1.0 255.255.255.0 area 0

    • D. 

      Router(config-router)# network 172.16.1.0 0.0.0.0 area 0

  • 20. 
    Refer to the exhibit. Which type of route is 172.16.0.0/16?
    • A. 

      Child route

    • B. 

      Level 1 parent route

    • C. 

      Default route

    • D. 

      Ultimate route

  • 21. 
    Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?
    • A. 

      Fully specified static route

    • B. 

      Recursive static route

    • C. 

      Directly attached static route

    • D. 

      Floating static route

  • 22. 
    Which subnet mask would be used as the classful mask for the IP address 192.135.250.27?
    • A. 

      255.0.0.0

    • B. 

      255.255.0.0

    • C. 

      255.255.255.0

    • D. 

      255.255.255.224

  • 23. 
    Which subnet mask would be used as the classful mask for the IP address 128.107.52.27?
    • A. 

      255.0.0.0

    • B. 

      255.255.0.0

    • C. 

      255.255.255.0

    • D. 

      255.255.255.224

  • 24. 
    Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?
    • A. 

      1

    • B. 

      5

    • C. 

      8

    • D. 

      20

    • E. 

      25

    • F. 

      30

  • 25. 
    The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?
    • A. 

      Flash

    • B. 

      NVRAM

    • C. 

      RAM

    • D. 

      ROM