CCNA-Study01 Flashcards
Which of the following is the most correct description about portfast?
It is the ability to shift from blocking state to forwarding state immediately
It is the ability to shorten the convergence time of STP
It is the ability to migrate from listening state to forwarding state immediately
It is the ability to shorten the time taken to restart the switch
It is the ability to shift from blocking state to learning state immediately
It is the ability to shift from blocking state to forwarding state immediately
Which of the following can control with QoS (select all that apply)
.delay .Bandwidth .load .Number of paths .Jitter .loss
.delay
.Bandwidth
.Jitter
.loss
(config) #enable password ccna
When this setting is made, which mode needs a password?
User mode Router configuration mode Global Configuration Mode Privileged mode Line configuration mode
Privileged mode
Which of the following is the protocol used during file transfer and needs a connection,?
SMTP SNMP DHCP TFTP FTP
FTP
Which of the following is HSRP’s virtual MAC address (select 2)
0C07.0000.acac 0000.0c07.ac05 0000.0c07.acac 0C07.0000.Ac05 0000.5E00.0101 0000.5E00.0105
- 0c07.ac05
0000. 0c07.acac
When there is an abnormality in the SNMP agent, which of the following is notified to SNMP manager?
TRAP GetRequest GetNextRequest SET REQUEST GetResponse
TRAP
In the switchport mode settings, which of the following can be a trunk port (select 3)
Dynamic Desirable Access server trunk Dynamic Auto Client
Dynamic Desirable
trunk
Dynamic Auto
Which are the correct WPA Descriptions (select 3)
.WPA2 Personal performs PSK certification
.Wireless LAN Security Standard
.It is a device that centrally manages access points
.PSK authentication is performed in WPA enterprise
.WPA3 is higher in security level than WPA
.RC4 is stronger than CNSA
.WPA2 Personal performs PSK certification
.Wireless LAN Security Standard
.WPA3 is higher in security level than WPA
Explanation:
Wireless LAN is provided with standards such as “WPA”, “WPA2” and “WPA3” with connection device authentication and communication encryption function.
[WPA Personal and WPA Enterprise]
WPA is called “WPA personal” or “WPA enterprise” by the authentication method used.
WPA Personal is a mode that does not use an authentication server. PSK (Pre-Shared Key: Pre-Shared Key) Authentication or SAE (Simultaneous Authentication of Equals: Simultane Equivalent Authentication) is called “WPA Personal”.
WPA Enterprise is a mode that uses an authentication server. If you are using IEEE 802.1x / EAP authentication, it is called “WPA Enterprise”.
Therefore, the correct answer · Wireless LAN security standard · WPA3 is higher security level than WPA · WPA2 Personal performs PSK certification is.
Other options are as follows.
· RC4 is stronger than CNSA
The encryption algorithm is incorrect because it is strong in the following order.
RC4
SUBNETTING On the subnetwork 192.168.2.0/26, which of the following IP addresses can be assigned to the host (select 3)
- 168.2.78
- 168.2.40
- 168.2.15
- 168.2.123
- 168.2.254
- 168.2.3
192.168.2.32
192.168.2.15
192.168.2.40
++++++++++++++++++++++++++++++
Explanation:
Convert the fourth field of the network address “192.168.2.0/26” to its binary number.
This 4th “0” will be written in binary as “00000000”.
Since this network is subnetted using /26, the upper two bits of the fourth octet are the network portion and the remaining six bits are the host portion.
Thus, the range of valid host addresses for this subnet is the fourth octet portion of the “00 000001” to The result is “00 111110”.
When this is converted to a decimal number from “1” to “62”, it can be seen that valid host addresses are in the range of “192.168.2.1” to “192.168.2.62”.
Therefore, the correct answer 192.168.2.15 · 192.168.2.32 · 192.168.2.40 is.
Other options are incorrect because they are not in the range of “192.168.2.1” to “192.168.2.62”.
Which of the following is the correct description of the access and distribution layers? (select 3)
End users directly connect to the access layer
The distribution layer is required to commicate with layer 3
The access layer aggregates the distribution of distribution layer
End users directly connect to the distribution layer
The access layer needs to correspond with Layer 3 routing
Distribution Layer aggregates access layer switches
End users directly connect to the access layer
The distribution layer is required to communicate with layer 3
Distribution Layer aggregates access layer switches
Which combination of multi-element authentication among options?
After entering your ID and password, answer the secret question
Perform retinal authentication after fingerprint authentication
Use a password that combines the number of characters and combining upper and lower case letters and symbols of alphabet
After entering your ID and password, enter the authentication code sent to your smartphone on a short message
After entering your ID and password, enter the authentication code sent to your smartphone on a short message
If multiple route’s information are listed in the routing table, which of the following information is prioritized for selecting a route to be used (Select 2)?
.Metric
.Longest match
.Administrative distance value
.The order in which they were learned
.Longest match
.The order in which they were learned
RouterA (config) #ntp server 192.168.1.254
Which is the most accurate description of this setting? (Select2)
RouterA is an NTP client Sets OSPF Sets static routing Sets IP address It is an NTP server using RouterA's own hardware clock
RouterA is an NTP client
It is an NTP server using RouterA’s own hardware clock
Which of the following are the correct descriptions of Layer 2 EtherChannel (select 2)
It is necessary to match in the opposite switch and access port mode or trunk port mode
Assign one IP address per port channel
Uses the “CHANNEL-GROUP” command
Uses the “no switchport” command
Assigns one IP address per physical interface
It is necessary to match in the opposite switch and access port mode or trunk port mode
Uses the “CHANNEL-GROUP” command
Which of the following is the correct statement about shaping.
(select 3)?
.Used to reduce delay
.Keep packets that exceed the delivery rate in queue
.Classification and marking for packets
.Processing important packets by CBWFQ and LLQ
.It is a QoS tool with a bandwidth control role
.Set the maximum number of deliverable metals available in advance
.Keep packets that exceed the delivery rate in queue
.It is a QoS tool with a bandwidth control role
.Set the maximum number of deliverable metals available in advance
Explanation:
【QoS Tool】
The function to achieve QoS is called “QoS Tool”. The QoS tool has the following:
· Congestion Management (Classification, Marking, Queing, Scheduling)
· Congestion avoidance (Red, WRED)
· Bandwidth control (shaping, policing)
Shaping is implemented on the sending side and the packet beyond the delivery rate is queued so as not to exceed the specified delivery rate, and transmitted when it becomes possible to transmit. Because it may not be sent in real time, it is a factor of delay and jitter.
If the amount of direct transmission data is low, you can permit transmission (burst) beyond the delivery rate.
Therefore, the correct answers are:
· It is a QoS tool with a bandwidth control role
· Set the maximum number of transmission rates available in advance
· Keep packet beyond the delivery rate
Other options are as follows.
· Classification and marking for packets
· Preatentially handling important packets by CBWFQ and LLQ
It is a role of congestion management.
· Used to reduce delay
Shaping is an incorrect because it causes delay and jitter generation.
Which of the following is the correct one in the description of the process ID of the OSPF. (select 3)
.Process ID can set any value from 1 to 65535
.Unable to assign multiple process IDs to a single router
.Process IDs are automatically assigned numbers from 1 to 1
.It is the number required to identify the information in the OSPF database
.All routers in the same area must use the same process ID
.Local meaningful number
.Process ID can set any value from 1 to 65535
.It is the number required to identify the information in the OSPF database
.Local meaningful number
Explanation:
The OSPF process ID is the number required to identify the information inside the router, and specifies an arbitrary value of 1 to 65535.
Because of the meaningful value, there is no need to specify the same number as other routers.
Therefore, the correct answer
· It is the number required to identify the information in the OSPF database
· Local is a number that is meaningful
• Process ID can set any value from 1 to 65535
is.
Other options are as follows.
· All routers in the same area must use the same process ID
The process ID is the number used for internal processing, so there is no need to make the same number as other routers.
• Process IDs are automatically assigned numbers from 1 to 1
Process IDs can be arbitrary values from “1 to 65535”.
· You can not assign multiple process IDs to a single router
Multiple process IDs can be assigned to one router.
Which are features of hub and spoke type. (select 2)
.Spokes can be used to facilitate access restrictions between spokes
.Using hubs can easily limit inter-spoke communication access restrictions
.Configuration to connect points 1 to 1
.Configuration via hub which is a central point in communication between point
.Configuration where all points can communicate directly
.Performance between bases via a hub which is a central base
.Use hubs to facilitate access restrictions for spoke communication
· Performance between bases via a hub which is a central base
· Use hubs to facilitate access restrictions for spoke communication
Explanation:
The hub and spoke type is a configuration that radially connects other locations centered on a site.
The central base is called “hub” and other bases are called spokes.
When communicating between spokes, it will go through the hub.
Therefore, access restrictions can be easily realized by access restrictions with hubs.
Therefore, the correct answers are:
· Performance between bases via a hub which is a central base
· Use hubs to facilitate access restrictions for spoke communication
Other options are as follows.
· Configuration that all sites can communicate directly
It is a full mesh type configuration.
· Configuration to connect between bases 1 to 1
It is a point-to-point type configuration.
· Use spokes to facilitate access restrictions for spoke communication
When communicating between spokes, be sure to pass access with hub access restrictions to facilitate access restrictions by accessing the hub. It is not a spoke access restriction to facilitate access restriction.
Subnetting
If a Class C address is subnetted using /27, which of the following would be the broadcast address for that subnet?
- 14.76.254
- 14.76.159
- 14.76.33
- 14.76.98
- 14.76.87
- 14.76.64
200.14.76.159
The Broadcast address of the class C address, which has been subnetted by / 27, is an address that is all “1”, indicating the value of the host part in binary number.
If you try all four octets of the address of the option, express them in binary numbers ….
33 → “001 00001”
64 → “010 00000”
87 → “010 10111”
98 → “011 00010”
159 → “100 11111”
254 → “111 11110”
It will be.
Because it is subnetized with / 27, the host will be 5 digits below.
Because the value of the host part is “1” is “159”, the correct answer is “200.14.76.159”.
How are ENABLE PASSWORD and ENABLE SECRET set?
.”Enable Password” is prioritized if both are set
.You need to set “enable password” before setting “Enable Secret”
.If both are set, both passwords will be required
.”Enable Password” is a command that has been added after .”Enable Secret”
.”Enable Password” is encrypted by default
“Enable Secret” is encrypted by MD5 by default
.”Enable Secret” is encrypted by MD5 by default
GRE Over IPSec VPN
Which of the following are correct descriptions of GRE Over IPSec VPN (select 2)
.Encrypts .Multicast can be used .Only Unicast can be used .Dynamic routing can not be used .Data can not be encrypted
.Encrypts
.Multicast can be used
Explanation:
GRE OVER IPSec VPN is a way to combine GRE and IPSec to build VPNs.
This allows you to build a VPN that combines the security features of IPSec and the benefits of enabling GRE multicast.
Therefore, the correct answers are:
· Multicast is available for use
· Encrypt
Other options are as follows.
· Dynamic routing can not be used
Because GRE supports multicast and broadcast, dynamic routing can be used.
· Only Unicast can be used
IPSec features.
By using GRE, multicast and broadcast also become available in addition to unicast.
· Can not encrypt data
It is a feature of GRE.
By using IPSec together, data encryption can also be performed.
Of the authentication elements, one is classified as a living element (select 2)
password
One-time password generator
fingerprint
MAC address
PIN number
retina
fingerprint
retina
Which of the following were added in SNMPv3 (select 3)
SET REQUEST .encryption .GetRequest .Message integrity .GetNextRequest .Username and password authentication
.encryption
.Message integrity
.Username and password authentication
Which of the following are the correct description of a optical fiber structure (select 2)
The core covers the cladding
Light signal passes through the cladding
Light signal passes through the core
Quartz glass is used as the core material
Copper wire is used for the core material
Light signal passes through the core
Quartz glass is used as the core material
Which is actually transferred packets or frames in network devices?
controller Service abstraction layer Data plane Control plane Management plane
Data plane