CCNA Flashcards

1
Q

Which two VPN technologies are recommended by Cisco for multiple branch offices and large-scale deployments? (Choose two.)

A. site-to-site VPN
B. IDMVPN
C. IGETVPN
D. IPsec remote access
E. clientless VPN

A

IDMVPN & clientless VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol allows an engineer to back up 20 network router configurations globally while using the copy function?

A. SMTP
B. SNMP
C. TCP
D. FTP

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does encryption project the wireless network?

A. via integrity checks to identify wireless forgery attacks in the frame
B. via specific ciphers to detect and prevent zero-day network attacks
C. via an algorithm to change wireless data so that only the access point and client understand it
D. via a policy to prevent unauthorized users from communicating on the wireless network

A

via an algorithm to change wireless data so that only the access point and client understand it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A network administrator enabled port security on a switch interface connected to a printer. What is the next configuration action in order to allow the point to learn the MAC address of the printer and insert it into the table automatically?

A. enable dynamic MAC address learning
B. implement static MAC addressing
C. enable sticky MAC addressing
D. implement auto MAC address learning

A

enable sticky MAC addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What occurs to frames during the process of frame flooding?

A. Frames are sent to every port on the witch in the same VLAN except the originating port
B. Frames are sent to every port on the switch that has a matching entry in the MAC address table
C. Frames are sent to all ports, including those that are assigned to other VLANs
D. Frames are sent to every port on the switch in the same VLAN

A

Frames are sent to every port on the switch in the same VLAN except the originating port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of network attacks overwhelms the target server by sending multiple packets to a port until the half-open TCP resources of the target are exhausted?

A. SYIM flood
B. reflection
C. teardrop
D. amplification

A

SYIM flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between IPv6 unicast and anycast addressing?

A. IPv6 anycast nodes must be explicitly configured to recognize the anycast address, but IPv6 unicast nodes require no special configuration
B. IPv6unicast nodes must be explicitly configured to recognize the unicast address, but IPv6 anycast nodes require no special configuration
C. An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes.
D. Unlike an IPv6 anycast address, and IPV6 unicast address is assigned to a group of interfaces on multiple nodes.

A

An individual IPv6 unicast address is supported on a single interface on one node but an IPv6 anycast address is assigned to a group of interfaces on multiple nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?

A. No router ID is set, and the OSPF protocol doesn’t run.
B The highest up/up physical interface IP address is selected as the router ID
C. The lowest IP address is incremented by 1 and selected as the router ID
D. The router ID 0.0.0.0 is selected and placed in the OSPF process

A

The highest up/up physical interface IP address is selected as the router ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two IPv6 addresses are used to provide connectivity between two routers on a shared link? (Choose two.)

A. FF02::0001:FF00:0000/104
B. ff06:bb43:cc13:dd16:1bb:ff14:7545:234d
C. 2002::512:1204b:1111::1/64
D. 2001:701:104b:1111::1/64
E. ::ffff:10.14.101.1/96

A

2002::512:1204b:1111::1/64
2001:701:104b:1111::1/64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a notice-level messaging is sent to a syslog server, which event has occurred?

A. A network device has restarted
B. An ARP inspection has failed
C. A routing instance has flapped
D. A debug operation is running

A

A routing instance has flapped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What benefit does controller-based networking provide versus traditional networking?

A. moves from a two-tier to a three-tier network architecture to provide maximum redundancy
B. provides an added layer of security to protect from DDoS attacks
C. allows configuration and monitoring of the network from one centralized port
D. combines control and data plane functionality on a single device to minimize latency

A

allows configuration and monitoring of the network from one centralized port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which technology can prevent client devices from arbitrarily connecting to the network without state remediation?

A. 802.1x
B. IP Source Guard
C. MAC Authentication Bypass
D. 802.11n

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?

A. dual algorithm
B. metric
C. administrative distance
D. hop count

A

administrative distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols?

A. dual algorithm
B. metric
C. administrative distance
D. hop count

A

administrative distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two components comprise part of a PKI?

A. preshared key that authenticates connections
B. RSA token
C. CA that grants certificates
D. clear-text password that authenticates connections
E. one or more CRLs

A

RSA token & CA that grants certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two similarities between UTP Cat 5e and Cat 6a cabling?

A. Both operate at a frequency of 500 MHz.
B. Both support runs of up to 55 meters.
C. Both support runs of up to 100 meters.
D. Both support speeds of at least 1 Gigabit.
E. Both support speeds up to 10 Gigabit.

A

Both support runs of up to 100 meters
Both support speeds of at least 1 Gigabit

17
Q

In which two ways does a password manager reduce the chance of a hacker stealing a user’s password?

A. It automatically provides a second authentication factor that is unknown to the original user
B. It uses an internal firewall to protect the password repository from unauthorized access
C. It protects against keystroke logging on a compromised device or website
D. It stores the password repository on the local workstation with built-in antivirus and anti-malware functionality
E. It encourages users to create stronger passwords

A

It protects against keystroke logging on a compromised device or website
It encourages users to create stronger passwords

18
Q

What is the role of a firewall in an enterprise network?

A. Forwards packets based on stateless packet inspection
B. Processes unauthorized packets and allows passage to less secure segments of the network
C. determines which packets are allowed to cross from unsecured to secured networks
D. explicitly denies all packets from entering an administrative domain

A

determines which packets are allowed to cross from unsecured to secured networks

19
Q

What are two protocols within the IPsec suite?

A. AH
B. 3DES
C. ESP
D. TLS
E. AES

A

AH & ESP

20
Q

Which two features introduced in SNMPv2 provide the ability to retrieve large amounts of data in one request?

A. Get
B. GetNext
C. Set
D. GetBulk
E. Inform

A

Get & Inform

21
Q

A Cisco engineer at a new branch office in configuring a wireless network with access points that connect to a controller that is based at corporate headquarters. Wireless client traffic must terminate at the branch office and access-point survivability is required in the event of a WAN outage. Which access point mode must be selected?

A. Lightweight with local switching disabled
B. Local with AP fallback enabled
C. OfficeExtend with high availability disabled
D. FlexConnect with local switching enabled

A

FlexConnect with local switching enabled

22
Q

Which two practices are recommended for an acceptable security posture in a network?

A. Backup device configurations to encrypted USB drives for secure retrieval
B. Maintain network equipment in a secure location
C. Use a cryptographic keychain to authenticate network devices
D. Place internal email and file servers in a designated DMZ
E. Disabled unused or unnecessary ports, interface, and services

A

Maintain network equipment in a secure location
Disable unused or unnecessary port, interfaces, and services

23
Q

A network analyst is tasked with configuring the date and time on a router using EXEC mode. The date must be set to 12:00 AM which command should be used?

A. Clock timezone
B. Clock summer-time-recurring
C. Clock summer-time date
D. Clock set

A

clock set

24
Q

What are two differences between optical-fiber cabling and copper cabling?

A. Light is transmitted through the core of the fiber
B. A BNC connector is used for fiber connections
C. The glass core component is encased in a cladding
D. Fiber connects to physical interfaces using Rj-45 connections
E. The data can pass through the cladding

A

Light is transmitted through the core of the fiber
The glass core component is encased in a cladding

25
Q

What are network endpoints?

A. act as routers to connect a user to the service prowler network
B. a threat to the network if they are compromised
C. support inter-VLAN connectivity
D. enforce policies for campus-wide traffic going to the internet

A

A threat to the network if they are compromised

26
Q

Which interface enables communication between a program on the controller and a program on the networking devices?

A. Northbound Interface
B. Software Virtual Interface
C. Southbound Interface
D. Tunnel Interface

A

Southbound Interface

27
Q

Which type of organization should use a collapsed-core architecture?

A. large and requires a flexible, scalable network design
B. large and must minimize downtime when hardware fails
C. small and needs to reduce networking costs currently
D. small but is expected to grow dramatically in the near future

A

small but needs to reduce networking costs currently

28
Q

Which purpose does a northbound API serve in a controller-based network hardware?

A