Ccna2 Final Exam (New Questions)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Claessensfrankie
C
Claessensfrankie
Community Contributor
Quizzes Created: 1 | Total Attempts: 634
| Attempts: 634 | Questions: 44
Please wait...
Question 1 / 44
0 %
0/100
Score 0/100
1. What is the minimum configuration for a router interface that is participating in IPv6 routing?

Explanation

The minimum configuration for a router interface that is participating in IPv6 routing is to have only a link-local IPv6 address. This means that the router interface needs to have an IPv6 address that is only valid for communication within the local network segment. This type of address is typically automatically assigned to the interface when IPv6 is enabled, and it allows the router to communicate with other devices on the same network segment.

Submit
Please wait...
About This Quiz
Ccna2 Final Exam (New Questions) - Quiz

All the questions and answers for the CCNA2 Final Exam can be found on ccna5. Net.
Their quiz only covers the first 58 questions, for the other 44... see morequestions listed under "new questions", this quiz was made. If you combine both quizzes, you'll have around 100 questions in total. 58 questions quiz: https://www. Ccna5. Net/ccna-2-rs-routing-and-switching-essentials-final- exam see less

2. Which command will enable auto-MDIX on a device?

Explanation

The command "S1(config-if)# mdix auto" will enable auto-MDIX on a device. Auto-MDIX is a feature that allows a device to automatically detect and configure the correct type of cable (straight-through or crossover) to use for a connection. By enabling auto-MDIX, the device will be able to automatically adjust the cable configuration as needed, eliminating the need for manual cable swapping.

Submit
3. Fill in the blank.The default administrative distance for a static route is _____.

Explanation

The default administrative distance for a static route is 1. Administrative distance is a measure of the trustworthiness or reliability of a routing information source. In the case of static routes, which are manually configured by a network administrator, they are considered the most reliable and have the lowest administrative distance. Therefore, the default administrative distance for a static route is 1.

Submit
4. Fill in the blank.Static routes are configured by the use of the global configuration command _____

Explanation

Static routes are configured by using the global configuration command "ip route". This command allows network administrators to manually specify the next-hop IP address or exit interface for a specific destination network. By using static routes, network administrators can control the flow of traffic in their network and provide explicit routing instructions to the router. This is especially useful when there is a need to bypass dynamic routing protocols or when specific routing paths need to be defined.

Submit
5. What is the effect of issuing the passive-interface default command on a router that is configured for OSPF?

Explanation

The passive-interface default command is used to set all OSPF-enabled interfaces as passive interfaces by default. A passive interface does not send OSPF messages, such as hello packets, to its neighbors. Therefore, issuing this command on a router configured for OSPF will prevent OSPF messages from being sent out any OSPF-enabled interface. This can be useful in scenarios where you want to reduce OSPF traffic or prevent certain interfaces from participating in OSPF routing.

Submit
6. A network administrator is implementing a distance vector routing protocol between neighbors on the network. In the context of distance vector protocols, what is a neighbor?

Explanation

In the context of distance vector routing protocols, a neighbor refers to routers that are connected to each other through a shared link and use the same routing protocol. These routers exchange information about network topology and distances to different destinations. By sharing this information, the routers can determine the best paths for forwarding network traffic.

Submit
7. Fill in the blank.The acronym describes the type of traffic that has strict QoS requirements and utilizes a one-way overall delay less than 150 ms across the network. _____

Explanation

The acronym "VoIP" stands for Voice over Internet Protocol. It refers to a type of traffic that requires strict Quality of Service (QoS) requirements and relies on a one-way overall delay of less than 150 ms across the network. VoIP enables the transmission of voice communications over the internet, allowing users to make phone calls using an internet connection rather than traditional telephone lines.

Submit
8. Fill in the blank.The OSPF Type 1 packet is the _____ packet.

Explanation

The OSPF Type 1 packet is the "hello" packet. This packet is used by OSPF routers to establish and maintain neighbor relationships. It is sent periodically to all OSPF routers on a network segment to discover and maintain adjacency. The hello packet contains important information such as the router ID, area ID, and priority, which are used for neighbor discovery and election of designated and backup designated routers.

Submit
9. Which two methods can be used to provide secure management access to a Cisco switch? (Choose two.)

Explanation

The two methods that can be used to provide secure management access to a Cisco switch are configuring specific ports for management traffic on a specific VLAN and configuring SSH for remote management. By configuring specific ports for management traffic on a specific VLAN, the switch can be accessed securely through designated ports that are dedicated for management purposes. This helps to isolate management traffic from regular data traffic, enhancing security. Additionally, configuring SSH for remote management enables encrypted and secure access to the switch remotely, ensuring confidentiality and integrity of the management session.

Submit
10. Which two statements are true about half-duplex and full-duplex communications? (Choose two.)

Explanation

Full duplex communications allow both ends to transmit and receive data simultaneously, which maximizes the use of the available bandwidth. This means that the communication channel is utilized to its full potential, resulting in efficient and faster data transfer.

Submit
11. Which two commands should be implemented to return a Cisco 3560 trunk port to its default configuration? (Choose two.)

Explanation

The given answer suggests that the two commands that should be implemented to return a Cisco 3560 trunk port to its default configuration are "no switchport trunk native vlan" and "no switchport trunk allowed vlan". By using these commands, any previously configured native VLAN and allowed VLANs on the trunk port will be removed, effectively resetting it to its default configuration.

Submit
12. Refer to the exhibit. Which type of route is 172.16.0.0/16?

Explanation

The given IP address, 172.16.0.0/16, falls under the category of a "level 1 parent route." In networking, routes are organized in a hierarchical structure, with parent routes encompassing multiple child routes. A level 1 parent route is one that covers a range of IP addresses within a specific network. In this case, the route 172.16.0.0/16 includes all IP addresses from 172.16.0.0 to 172.16.255.255, making it a level 1 parent route.

Submit
13. The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?

Explanation

RAM stands for Random Access Memory, which is a type of computer memory that allows data to be read from and written to quickly. In the context of a router, RAM is used to temporarily store the buffers for packet processing and the running configuration file. This allows the router to efficiently process incoming packets and quickly access the current configuration. Flash memory, NVRAM, and ROM are other types of memory used in routers, but they do not serve the same purpose as RAM in this case.

Submit
14. Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

Explanation

In the exhibit, the static route is configured with the next-hop IPv6 address of 2001:DB8:1:2::1. A recursive static route is used when the next-hop IP address is not directly connected but is reached through another router. In this case, the router will recursively determine the best path to reach the destination by forwarding the packet to the next-hop router specified in the static route. Therefore, the correct answer is recursive static route.

Submit
15. A network technician is configuring port security on switches. The interfaces on the switches are configured in such a way that when a violation occurs, packets with unknown source address are dropped and no notification is sent. Which violation mode is configured on the interfaces?

Explanation

The violation mode that is configured on the interfaces is "protect". In this mode, when a violation occurs, packets with an unknown source address are dropped, but no notification is sent. The protect mode allows the switch to protect against unauthorized devices by simply dropping the packets from unknown sources without alerting the network administrator.

Submit
16. Please fill answer belowa router learns of multiple toward the same destination. Which value in a routing table replesents the trustworthiness of learned routes and is used by the router to determine which route to install into the routing table for specific situation? _____

Explanation

The value in a routing table that represents the trustworthiness of learned routes and is used by the router to determine which route to install into the routing table for a specific situation is the metric. The metric is a numerical value assigned to each route, indicating the cost or distance to reach a destination. A lower metric value indicates a more reliable or efficient route, and the router will prefer routes with lower metrics over routes with higher metrics when making routing decisions.

Submit
17. Why would an administrator use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses?

Explanation

An administrator would use a network security auditing tool to flood the switch MAC address table with fictitious MAC addresses in order to determine which ports are not correctly configured to prevent MAC address flooding. By flooding the MAC address table, the administrator can identify any ports that are not properly configured to handle excessive MAC address traffic, which could potentially lead to security vulnerabilities or network disruptions. This allows the administrator to take corrective actions and ensure that the switch is properly configured to prevent MAC address flooding.

Submit
18. Refer to the exhibit. The Branch Router has an OSPF neighbor relationship with the HQ router over the 198.51.0.4/30 network. The 198.51.0.8/30 network link should serve as a backup when the OSPF link goes down. The floating static route command ip route 0.0.0.0 0.0.0.0 S0/1/1 100 was issued on Branch and now traffic is using the backup link even when the OSPF link is up and functioning. Which change should be made to the static route command so that traffic will only use the OSPF link when it is up?

Explanation

The administrative distance determines the trustworthiness of a routing protocol. A lower administrative distance indicates a higher trust level. In this case, the static route has an administrative distance of 100, which is lower than the administrative distance of OSPF (which is typically 110 or lower). Therefore, the static route is preferred over the OSPF route, even when the OSPF link is up and functioning. To ensure that traffic only uses the OSPF link when it is up, the administrative distance of the static route should be increased. Changing the administrative distance to 120 will make the OSPF route more preferred and traffic will use the OSPF link when it is up.

Submit
19. Which value represents the "trustworthiness" of a route and is used to determine which route to install into the routing table when there are multiple routes toward the same destination?

Explanation

Administrative distance represents the "trustworthiness" of a route. It is used to determine which route to install into the routing table when there are multiple routes toward the same destination. A lower administrative distance indicates a higher trustworthiness and priority for that route to be chosen. Therefore, administrative distance is an important factor in route selection and influences the routing decisions made by routers in a network.

Submit
20. Which statement is true about the difference between OSPFv2 and OSPFv3?

Explanation

In OSPFv3, routers do not need to have matching subnets to form neighbor adjacencies. This means that OSPFv3 routers can form adjacencies even if they have different subnet configurations. This is different from OSPFv2, where routers must have matching subnets in order to form neighbor adjacencies. This feature in OSPFv3 allows for more flexibility and ease of configuration in networks with diverse subnet configurations.

Submit
21. To enable RIP routing for a specific subnet, the configuration command network 192.168.5.64 was entered by the network administrator. What address, if any, appears in the running configuration file to identify this network?

Explanation

The network address that appears in the running configuration file to identify the network is 192.168.5.0. This is because when configuring RIP routing using the "network" command, the address specified is used as the network address. In this case, the network address is 192.168.5.0, which represents the subnet that the network administrator wants to enable RIP routing for.

Submit
22. Which two characteristics describe the native VLAN? (Choose two.)

Explanation

The native VLAN provides a common identifier to both ends of a trunk, meaning that it allows devices on both ends of the trunk to communicate with each other using the same VLAN. The native VLAN traffic will be untagged across the trunk link, which means that it does not have any VLAN tags added to it. This allows for compatibility with devices that do not understand VLAN tagging.

Submit
23. Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.)

Explanation

The three pairs of trunking modes that will establish a functional trunk link between two Cisco switches are dynamic desirable - dynamic auto, dynamic desirable - dynamic desirable, and dynamic desirable - trunk. The dynamic desirable mode actively attempts to form a trunk link, while dynamic auto mode passively waits for the other end to initiate the trunking negotiation. The trunk mode allows the interface to become a trunk link immediately. These combinations ensure that both switches are actively participating in the trunk negotiation process, allowing for the successful establishment of a trunk link.

Submit
24. Which subnet mask would be used as the classful mask for the IP address 192.135.250.27?

Explanation

The classful mask for the IP address 192.135.250.27 would be 255.255.255.0. This is because the IP address falls within the range of Class C addresses, which have a default subnet mask of 255.255.255.0.

Submit
25. Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?

Explanation

Based on the exhibit, the router with the highest OSPF priority will become the designated router (DR), while the router with the second-highest priority will become the backup designated router (BDR). In this case, router R4 has the highest priority (priority 200), making it the DR. Router R3 has the second-highest priority (priority 150), making it the BDR.

Submit
26. Which subnet mask would be used as the classful mask for the IP address 128.107.52.27?

Explanation

The IP address 128.107.52.27 falls under Class B network range. Class B networks have a default subnet mask of 255.255.0.0. Therefore, the correct subnet mask for the given IP address would be 255.255.0.0.

Submit
27. Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?

Explanation

The native VLAN on a trunk link is used for untagged traffic. Cisco best practices recommend using a different native VLAN than the VLANs being used for data traffic to improve security and prevent VLAN hopping attacks. In this scenario, since VLANs 8, 20, 25, and 30 are being used, the native VLAN should be set to a different VLAN. The only option that is different from the VLANs being used is 5, so it should be used as the native VLAN on the trunk.

Submit
28. What is the purpose of an access list that is created as part of configuring IP address translation?

Explanation

The purpose of an access list that is created as part of configuring IP address translation is to define the private IP addresses that are to be translated. This means that the access list will specify which private IP addresses should undergo translation and be mapped to public IP addresses. By defining these specific private IP addresses, the access list controls which devices or networks can access the public network through the translation process.

Submit
29. What are two ways of turning off DTP on a trunk link between switches? (Choose two.)

Explanation

To turn off DTP on a trunk link between switches, there are two ways. The first way is to configure the attached switch ports with the "nonegotiate" command option. This command disables DTP negotiation on the ports, preventing them from sending or receiving DTP frames. The second way is to place the two attached switch ports in access mode. In access mode, the ports will not negotiate trunking with the neighboring switch and will only function as access ports, effectively turning off DTP on the trunk link.

Submit
30. While analyzing log files, a network administrator notices reoccurring native VLAN mismatches. What is the effect of these reoccurring errors?

Explanation

Reoccurring native VLAN mismatches can cause the control and management traffic on the error-occurring trunk port to be misdirected or dropped. This means that important network control and management messages may not reach their intended destination, leading to potential network issues and misconfiguration. It is crucial to resolve these mismatches to ensure proper communication and functionality within the network.

Submit
31. Refer to the exhibit. An attacker on PC X sends a frame with two 802.1Q tags on it, one for VLAN 40 and another for VLAN 12. What will happen to this frame?

Explanation

When an attacker on PC X sends a frame with two 802.1Q tags, one for VLAN 40 and another for VLAN 12, SW-A will remove both tags and forward the rest of the frame across the trunk link. SW-B will then receive the frame and forward it to the hosts on VLAN 40. This is because SW-A is configured to remove the tags and forward the frame based on the VLAN information.

Submit
32. Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?

Explanation

After a packet leaves H1, the L2 header is rewritten once when it reaches S1, and then it is rewritten again when it reaches S2. Therefore, the L2 header is rewritten two times in the path to H2.

Submit
33. An OSPF router has three directly connected networks; 172.16.0.0/16, 172.16.1.0/16, and 172.16.2.0/16. Which OSPF network command would advertise only the 172.16.1.0 network to neighbors?

Explanation

The correct answer is "router(config-router)# network 172.16.1.0 0.0.255.255 area 0". This command uses a wildcard mask of 0.0.255.255, which means that only the second octet of the IP address is considered for the network match. Therefore, it will only advertise the 172.16.1.0 network to neighbors.

Submit
34. Refer to the exhibit.What address will summarize the LANs attached to routers 2-A and 3-A and can be configured in a summary static route to advertise them to an upstream neighbor?

Explanation

The correct answer is 10.0.0.0/21. This is because it covers the range of all the LANs attached to routers 2-A and 3-A. The subnet mask /21 allows for a larger range of IP addresses compared to the other options, making it the most suitable choice for summarizing the LANs.

Submit
35. Refer to the exhibit. An ACL preventing FTP and HTTP access to the interval web server from all teaching assistants has been implemented in the Board Office. The address of the web server is 172.20.1.100 and all teaching assistants are assigned addresses in the 172.21.1.0/24 network. After implement the ACL, access to all servers is denied. What is the problem?

Explanation

The problem is that named ACLs require the use of port numbers. This means that the ACL implemented in the Board Office is not correctly configured to allow access to the FTP and HTTP ports on the web server. As a result, the ACL is denying access to all servers, including the web server. To fix the issue, the ACL should be modified to include the necessary port numbers for FTP and HTTP access to the web server.

Submit
36. The computers used by the network administrators for a school are on the 10.7.0.0/27 network. Which two commands are needed at a minimum to apply an ACL that will ensure that only devices that are used by the network administrators will be allowed Telnet access to the routers? (Choose two.)

Explanation

The command "access-list 5 permit 10.7.0.0 0.0.0.31" is needed to create an access list that permits traffic from the 10.7.0.0/27 network. The wildcard mask 0.0.0.31 allows for a range of IP addresses within the network. The command "access-class 5 in" is needed to apply the access list to the VTY lines, which control Telnet access to the routers. By using these two commands together, only devices within the 10.7.0.0/27 network will be allowed Telnet access to the routers.

Submit
37. A standard ACL has been configured on a router to allow only clients from the 10.11.110.0/24 network to telnet or to ssh to the VTY lines of the router. Which command will correctly apply this ACL?

Explanation

The correct command to apply the standard ACL is "access-group 11 in". This command will apply the ACL with the number 11 to the inbound traffic on the router's interfaces. By applying the ACL to the inbound traffic, it will restrict access to only clients from the 10.11.110.0/24 network to telnet or ssh to the VTY lines of the router.

Submit
38. Refer to the exhibit. What is the OSPF cost to reach the R2 LAN 172.16.2.0/24 from R1?

Explanation

The OSPF cost to reach the R2 LAN 172.16.2.0/24 from R1 is 74. This cost value is calculated based on the bandwidth of the link between R1 and R2. The higher the bandwidth, the lower the cost. Since the link between R1 and R2 has a bandwidth of 100 Mbps, the cost is calculated as 100 Mbps divided by 1 Gbps (1000 Mbps), which equals 1. The cost is then multiplied by 64 to get the final value of 64. However, OSPF adds an additional 10 to the cost, resulting in a total cost of 74.

Submit
39. A network technician has been asked to secure all switches in the campus network. The security requirements are for each switch to automatically learn and add MAC addresses to both the address table and the running configuration. Which port security configuration will meet these requirements?

Explanation

Dynamic secure MAC addresses is the correct answer because it allows the switch to automatically learn and add MAC addresses to both the address table and the running configuration. This configuration ensures that only the learned MAC addresses are allowed to access the network, providing a level of security by preventing unauthorized devices from connecting to the switch.

Submit
40. A security specialist designs an ACL to deny access to a web server from all sales staff. The sales staff are assigned addressing from the IPv6 subnet 2001:db8:48:2c::/64. The web server is assigned the address 2001:db8:48:1c::50/64. Configuring the WebFilter ACL on the LAN interface for the sales staff will require which three commands? (Choose three.)

Explanation

The correct answer is to use the commands "deny tcp host 2001:db8:48:1c::50 any eq 80", "deny tcp any host 2001:db8:48:1c::50 eq 80", and "deny ipv6 any any". These commands are necessary to deny access to the web server from all sales staff. The first two commands deny TCP traffic from the sales staff to the web server on port 80, while the third command denies any IPv6 traffic from any source to any destination. By using these three commands, the ACL effectively blocks all sales staff from accessing the web server.

Submit
41. Match the router memory type that provides the primary storage for the router feature. (Not all options are used.)
Submit
42. Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)

Explanation

The administrator can verify the name of the NAT pool by checking if it is set to "refCount". They can also verify if a standard access list numbered 1 was used in the configuration process by checking the access list configuration. To verify if address translation is working, the administrator can check if hosts are able to communicate with external networks using their translated addresses.

Submit
43. A new network policy requires an ACL to deny HTTP access from all guests to a web server at the main office. All guests use addressing from the IPv6 subnet 2001:DB8:19:C::/64. The web server is configured with the address 2001:DB8:19:A::105/64. Implementing the NoWeb ACL on the interface for the guest LAN requires which three commands? (Choose three.)

Explanation

The first command "deny tcp any host 2001:DB8:19:A::105 eq 80" denies TCP traffic from any source to the web server at the specified IPv6 address on port 80, effectively blocking HTTP access from all guests. The second command "permit ipv6 any any" allows any other IPv6 traffic from any source to any destination, ensuring that non-HTTP traffic is still allowed. The third command "ipv6 traffic-filter NoWeb in" applies the ACL named "NoWeb" as an inbound filter on the interface for the guest LAN, enforcing the ACL rules.

Submit
44. Match the order in which the link-state routing process occurs on a router.
Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 11, 2016
    Quiz Created by
    Claessensfrankie
Cancel
  • All
    All (44)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is the minimum configuration for a router interface that is...
Which command will enable auto-MDIX on a device?
Fill in the blank.The default administrative distance for a static...
Fill in the blank.Static routes are configured by the use of the...
What is the effect of issuing the passive-interface default command on...
A network administrator is implementing a distance vector routing...
Fill in the blank.The acronym describes the type of traffic that has...
Fill in the blank.The OSPF Type 1 packet is the _____ packet.
Which two methods can be used to provide secure management access to a...
Which two statements are true about half-duplex and full-duplex...
Which two commands should be implemented to return a Cisco 3560 trunk...
Refer to the exhibit. Which type of route is 172.16.0.0/16?
The buffers for packet processing and the running configuration file...
Refer to the exhibit. Which type of IPv6 static route is configured in...
A network technician is configuring port security on switches. The...
Please fill answer belowa router learns of multiple toward the same...
Why would an administrator use a network security auditing tool to...
Refer to the exhibit. The Branch Router has an OSPF neighbor...
Which value represents the "trustworthiness" of a route and is used to...
Which statement is true about the difference between OSPFv2 and...
To enable RIP routing for a specific subnet, the configuration command...
Which two characteristics describe the native VLAN? (Choose two.)
Which three pairs of trunking modes will establish a functional trunk...
Which subnet mask would be used as the classful mask for the IP...
Refer to the exhibit. If the switch reboots and all routers have to...
Which subnet mask would be used as the classful mask for the IP...
Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on...
What is the purpose of an access list that is created as part of...
What are two ways of turning off DTP on a trunk link between switches?...
While analyzing log files, a network administrator notices reoccurring...
Refer to the exhibit. An attacker on PC X sends a frame with two...
Refer to the exhibit. Assuming that the routing tables are up to date...
An OSPF router has three directly connected networks; 172.16.0.0/16,...
Refer to the exhibit.What address will summarize the LANs attached to...
Refer to the exhibit. An ACL preventing FTP and HTTP access to the...
The computers used by the network administrators for a school are on...
A standard ACL has been configured on a router to allow only clients...
Refer to the exhibit. What is the OSPF cost to reach the R2 LAN...
A network technician has been asked to secure all switches in the...
A security specialist designs an ACL to deny access to a web server...
Match the router memory type that provides the primary storage for the...
Refer to the exhibit. A network administrator has just configured...
A new network policy requires an ACL to deny HTTP access from all...
Match the order in which the link-state routing process occurs on a...
Alert!

Advertisement