CCNA2 Flashcards
Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?

2
Refer to the exhibit. Which highlighted value represents a specific destination network in the routing table?

172.16.100.64
Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?
floating static route
Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?

S 192.168.2.0/24 [1/0] via 172.16.2.2
What network prefix and prefix-length combination is used to create a default static route that will match any IPv6 destination?
::/0
A router has used the OSPF protocol to learn a route to the 172.16.32.0/19 network. Which command will implement a backup floating static route to this network?
ip route 172.16.32.0 255.255.224.0 S0/0/0 200
Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?

ip route 10.10.0.0 255.255.0.0 209.165.200.225 100
Which statement describes a route that has been learned dynamically?
It is automatically updated and maintained by routing protocols.
Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)
They improve network security.
They use fewer router resources.
A network administrator adds the default-information originate command to the configuration of a router that uses RIP as the routing protocol. What will result from adding this command?
The router will propagate a static default route in its RIP updates, if one is present.
Refer to the exhibit. What is the administrative distance value that indicates the route for R2 to reach the 10.10.0.0/16 network?

1
A network administrator reviews the routing table on the router and sees a route to the destination network 172.16.64.0/18 with a next-hop IP address of 192.168.1.1. What are two descriptions of this route? (Choose two.)
ultimate route
level 2 child route
Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.)
scalability
speed of convergence
Employees of a company connect their wireless laptop computers to the enterprise LAN via wireless access points that are cabled to the Ethernet ports of switches. At which layer of the three-layer hierarchical network design model do these switches operate?
access
What is a characteristic of the distribution layer in the three layer hierarchical model?
provides access to the rest of the network through switching, routing, and network access policies
Which information does a switch use to populate the MAC address table?
the source MAC address and the incoming port
Which statement is correct about Ethernet switch frame forwarding decisions?
Frame forwarding decisions are based on MAC address and port mappings in the CAM table.
Which switching method drops frames that fail the FCS check?
store-and-forward switching
In what situation would a Layer 2 switch have an IP address configured?
when the Layer 2 switch needs to be remotely managed
A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.)
IP address
vty lines
default gateway
A network technician has been asked to secure all switches in the campus network. The security requirements are for each switch to automatically learn and add MAC addresses to both the address table and the running configuration. Which port security configuration will meet these requirements?
sticky secure MAC addresses
A network administrator is configuring port security on a Cisco switch. When a violation occurs, which violation mode that is configured on an interface will cause packets with an unknown source address to be dropped with no notification sent?
protect
Two employees in the Sales department work different shifts with their laptop computers and share the same Ethernet port in the office. Which set of commands would allow only these two laptops to use the Ethernet port and create violation log entry without shutting down the port if a violation occurs?
switchport mode access
switchport port-security
switchport port-security maximum 2
switchport port-security mac-address sticky
switchport port-security violation restrict
Refer to the exhibit. What protocol should be configured on SW-A Port 0/1 if it is to send traffic from multiple VLANs to switch SW-B?

IEEE 802.1Q





























