Cuestionario Ccna 2
Cuestionario Ccna 2
1 Which QoS tool can you use to optimize voice traffic on a network that is primarily intended
for data traffic?
Selecciona una de las siguientes respuestas posibles:
• WFQ
• PQ
• WRED
• FIFO
5 What are two characteristics of the distribution layer in a three-tier network architecture?
(Choose two)
Selecciona una o más de las siguientes respuestas posibles:
• designed to meet continuous, redundant uptime requirements
• provides a boundary between Layer 2 and Layer 3 communications
• serves as the network aggregation point
• is the backbone for the network topology
• physical connection point for a LAN printer
7 Which three statements about MAC addresses are correct? (Choose three)
Selecciona una o más de las siguientes respuestas posibles:
• To communicate with other devices on a network, a network device must have a
unique MAC address
• A MAC address contains two main components, the first of which identifies the
manufacturer of the hardware and the second of which uniquely identifies the
hardware
• The MAC address of a device must be configured in the Cisco IOS CLI by a user with
administrative privileges
• The MAC address is also referred to as the IP address
• An example of a MAC address is 0A:26:B8:D6:65:90
• A MAC address contains two main components, the first of which identifies the
network on which the host resides and the second of which uniquely identifies the
host on the network.
8 A manager asks a network engineer to advise which cloud service models are used so employees
do not have to waste their time installing, managing, and updating software which is only used
occasionally. Which cloud service model does the engineer recommend?
Selecciona una de las siguientes respuestas posibles:
• platform-as-a-service
• infrastructure-as-a-service
• software-as-a-service
• business process as service to support different types of service
9 Which security program element involves installing badge readers on data-center doors to
allow workers to enter and exit based on their job roles?
Selecciona una de las siguientes respuestas posibles:
• role-based access control
• multifactor authentication
• physical access control
• biometrics
10 Refer to the exhibit. A network administrator is configuring an EtherChannel between SW1 and
SW2. The SW1 configuration is shown. What is the correct configuration for SW2?
11 Which HTTP status code is returned after a successful REST API request?
Selecciona una de las siguientes respuestas posibles:
• 500
• 301
• 200
• 404
12 Refer to the exhibit. Router R4 is dynamically learning the path to the server. If R4 is connected
to R1 via OSPF Area 20, to R2 via R2 BGP, and to R3 via EIGRP 777, which path is installed in the
routing table of R4?
Selecciona una de las siguientes respuestas posibles:
• The path through R2, because the EBGP administrative distance is 20
• The path through R3, because the EIGRP administrative distance is lower than OSPF and
BGP
• The path through R1, because the OSPF administrative distance is 110
• The path through R2, because the IBGP administrative distance is 200
14 A network administrator must enable DHCP services between two sites. What must be
configured for the router to pass DHCPDISCOVER messages on to the server?
Selecciona una de las siguientes respuestas posibles:
• a DHCP Relay Agent
• DHCP Snooping
• DHCP Binding
• a DHCP Pool
15 Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber
path, users at SiteA report intermittent connectivity issues with applications hosted at SiteB.
What is the cause of the intermittent connectivity issue?
19 Refer to the exhibit. A frame from VLAN1 of switch S1 is sent to switch S2 where the frame
received on VLAN2. What causes this behavior?
Selecciona una de las siguientes respuestas posibles:
• trunk mode mismatches
• native vlan mismatches
• allowing only vlan 2 on the destination
• VLANs that do not correspond to a unique IP subnet
22 Drag and drop the statement about networking from the left into the corresponding
networking types on the right. Not all statements are used.
23 With REST API, which standard HTTP header tells a server which media type is expected by the
client?
Selecciona una de las siguientes respuestas posibles:
• Accept-Encoding: gzip, deflate
• Accept-Patch: text/example; charset=utf-8
• Content-Type: application/json; charset=utf-8
• Accept: application/json
24 What is the purpose of a southbound API in a control based networking architecture?
Selecciona una de las siguientes respuestas posibles:
• integrates a controller with other automation and orchestration tools
• allows application developers to interact with the network
• facilities communication between the controller and the applications
• facilities communication between the controller and the networking hardware
25 How do servers connect to the network in a virtual environment?
Selecciona una de las siguientes respuestas posibles:
• a virtual switch that links to an access point that is physically connected to the network
• a cable connected to a physical switch on the network
• wireless to an access point that is physically connected to the network
• a software switch on a hypervisor that is physically connected to the network
26 Which network action occurs within the data plane?
Selecciona una de las siguientes respuestas posibles:
• run routing protocols (OSPF, EIGRP, RIP, BGP)
• compare the destination IP address to the IP routing table
• make a configuration change from an incoming NETCONF RPC
• reply to an incoming ICMP echo request
33 When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption
of the entire original IP packet?
Selecciona una de las siguientes respuestas posibles:
• IPsec tunnel mode with AH
• IPsec transport mode with ESP
• IPsec transport mode with AH
• IPsec tunnel mode with ESP
34 Why was the RFC 1918 address space defined?
Selecciona una de las siguientes respuestas posibles:
• Support the NAT protocol
• Reduce instances of overlapping IP addresses
• Conserve public IPv4 addressing
• Preserve public IPv6 address space
35 When a switch receives a frame for a known destination MAC address, how is the frame
handed?
Selecciona una de las siguientes respuestas posibles:
• Sent to the port identified for the known MAC address
• Broadcast to all ports
• Flooded to all ports except the one from which it originated
• Forwarded to the first available port
36 Which protocol requires authentication to transfer a backup configuration file from a router to
a remote server?
Selecciona una de las siguientes respuestas posibles:
• TFTP
• SMTP
• DTP
• FTP
37 Refer to the exhibit. An administrator is tasked with configuring a voice VLAN. What is the
expected outcome when a Cisco phone is connected to the GigabitEthernet 3/1/4 port on a
switch?
39 What are two benefits of using the PortFast feature? (Choose two)
Selecciona una o más de las siguientes respuestas posibles:
• Enabled interfaces wait 50 seconds before they move to the forwarding state
• Enabled interfaces never generate topology change notifications.
• Enabled interfaces are automatically placed in listening state
• Enabled interfaces come up and move to the forwarding state immediately
• Enabled interfaces that move to the learning state generate switch topology change
notifications
40 Which two primary drivers support the need for network automation? (Choose two)
Selecciona una o más de las siguientes respuestas posibles:
• Eliminating training needs
• Increasing reliance on self-diagnostic and self-healing
• Providing a ship entry point for resource provisioning
• Reducing hardware footprint
• Policy-derived provisioning of resources
41 What is the purpose of using First Hop Redundancy Protocol in a specific subnet?
Selecciona una de las siguientes respuestas posibles:
• Forwards multicast hello messages between routers
• Sends the default route to the hosts on a network
• Filter traffic based on destination IP addressing
• Ensures a loop-free physical topology
42 Refer to the exhibit. Which switch becomes the root of the spanning tree for VLAN 110?
45 Which technology allows for multiple operating systems to be run on a single host computer?
Selecciona una de las siguientes respuestas posibles:
• server virtualization
• virtual device contexts
• network port ID visualization
• virtual routing and forwarding
46 What is the primary effect of the spanning-tree portfast command?
Selecciona una de las siguientes respuestas posibles:
• It enables BPDU messages
• It minimizes spanning-tree convergence time
• It immediately enables the port in the listening state
• It immediately puts the port into the forwarding state when the switch is reloaded
47 Refer to the exhibit. If R1 receives a packet destined to 172.16.1.1, to which IP address does it
send the packet?
53 Drag and drop the statements about networking from the left onto the corresponding
networking types on the right.
54 Which result occurs when PortFast is enabled on an interface that is connected to another
switch?
Selecciona una de las siguientes respuestas posibles:
• Root port choice and spanning tree recalculation are accelerated when a switch link goes
down
• After spanning tree converges PortFast shuts down any port that receives BPDUs.
• Spanning tree may fail to detect a switching loop in the network that causes broadcast
storms
• VTP is allowed to propagate VLAN configuration information from switch to switch
automatically
55 What is the function of a controller in controller-based networking?
Selecciona una de las siguientes respuestas posibles:
• It is a pair of core routers that maintain all routing decisions for a campus
• It is the card on a core router that maintains all routing decisions for a campus
• It serves as the centralized management point of an SDN architecture
• It centralizes the data plane for the network
56 Which protocol does an access point use to draw power from a connected switch?
Selecciona una de las siguientes respuestas posibles:
• Adaptive Wireless Path Protocol
• Neighbor Discovery Protocol
• Cisco Discovery Protocol
• Internet Group Management Protocol
57 Two switches are connected and using Cisco Dynamic Trunking Protocol. SW1 is set to Dynamic
Desirable. What is the result of this configuration?
Selecciona una de las siguientes respuestas posibles:
• The link is becomes an access port
• The link is in an error disables stale
• The link becomes a trunkport
• The link is in a downstate.
58 Refer to the exhibit. After the switch configuration the ping test fails between PC A and PC B.
Based on the output for switch 1, which error must be corrected?
Selecciona una de las siguientes respuestas posibles:
• All VLANs are not enabled on the trunk
• There is a native VLAN mismatch
• Access mode is configured on the switch ports.
• The PCs are in the incorrect VLAN
59 Which condition must be met before an NMS handles an SNMP trap from an agent?
Selecciona una de las siguientes respuestas posibles:
• The NMS must receive the same trap from two different SNMP agents to verify that it
is reliable
• The NMS must be configured on the same router as the SNMP agent
• The NMS software must be loaded with the MIB associated with the trap
• The NMS must receive a trap and an inform message from the SNMP agent within a
configured interval
60 What is a characteristic of cloud-based network topology?
Selecciona una de las siguientes respuestas posibles:
• Services are provided by a public, private, or hybrid deployment
• Onsite network services are provided with physical Layer 2 and Layer 3 components
• Physical workstations are configured to share resources
• Wireless connections provide the sole access method to services
61 Refer to the exhibit. A network administrator assumes a task to complete the connectivity
between PC A and the File Server. Switch A and Switch B have been partially configured with
VLANs 10, 11, 12 and 13. What is the next step in the configuration?
• Layer 2 switch
• Firewall
• Load balancer
• Router
66 An organization has decided to start using cloud-provided services. Which cloud service allows
the organization to install its own operating system on a virtual machine?
• infrastructure-as-a-service
• platform-as-a-service
• software-as-a-service
• network-as-a-service
67 What does an SDN controller use as a communication protocol to relay forwarding changes to
a southbound API?
• XML
• Java
• OpenFlow
• REST
68 Which two components are needed to create an Ansible script that configures a VLAN on a
switch? (Choose two)
• Cookbook
• Task
• Recipe
• Playbook
• Model
69 An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels.
What must be configured to allow clients to preferentially use 5GHz access points?
• OEAP Split Tunnel
• 11ac MU-MIMO
• Client Band Select
• Re-Anchor Roamed Clients
70 An engineer configures interface Gi1/0 on the company PE router to connect to an ISP Neighbor
discovery is disabled.
Which action is necessary to complete the configuration if the ISP uses third-party network
devices?
• Disable autonegotiation
• Enable LLDP globally
• Disable Cisco Discovery Protocol on the interface
• Enable LLDP-MED on the ISP device
71 Refer to the exhibit. Which action is expected from SW1 when the untagged frame is received
on the GigabitEthernet0/1 interface?
• Branch-3
• Branch-1
• Branch-2
• Branch-4
81 Refer to the exhibit. Which action is taken by the router when a packet is sourced from
10.10.10.2 and destined for 10.10.10.16?
• It uses a route that is similar to the destination address
• It floods packets to all learned next hops
• It discards the packets
• It queues the packets waiting for the route to be learned
82 Which WAN access technology is preferred for a small office / home office architecture?
• frame-relay packet switching
• broadband cable access
• dedicated point-to-point leased line
• Integrated Services Digital Network switching
83 Refer to the exhibit. PC1 is trying to ping PC3 for the first time and sends out an ARP to S1.
Which action is taken by S1?
85 Refer to the exhibit. Which two prefixes are included in this routing table entry? (Choose two)
• 192.168.1.64
• 192.168.1.127
• 192.168.1.254
• 192.168.1.17
• 192.168.1.61
86 How does a switch process a frame received on Fa0/1 with the destination MAC address of
0e38.7363.657b when the table is missing the address?
• It forwards the frame back out of interface Fa0/1.
• It drops the frame immediately.
• It floods the frame to all interfaces except Fa0/1.
• It holds the frame until the MAC address timer expires and then drops the frame.
87 Which technology is appropriate for communication between an SDN controller and
applications running over the network?
• OpenFlow
• Southbound API
• REST API
• NETCONF
88 What is a characteristic of spine-and-leaf architecture?
• It provides variable latency
• Each device is separated by the same number of hops
• It provides greater predictability on STP blocked ports
• Each link between leaf switches allows for higher bandwidth
89 An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a
trunk link. Which command should be used?
• switchport trunk allowed vlan 10
• switchport mode trunk
• switchport trunk encapsulation dot1q
• switchport trunk native vlan 10
90 Which access layer threat-mitigation technique provides security based on identity?
• using a non-default native VLAN
• Dynamic ARP Inspection
• 802.1x
• DHCP snooping
91 A network administrator must to configure SSH for remote access to router R1. The requirement
is to use a public and private key pair to encrypt management traffic to and from the connecting
client. Which configuration, when applied, meets the requirements?
• Option A
• Option C
• Option D
• Option B
92 Refer to the exhibit. What is the metric of the route to the 192.168.10.33/28 subnet?
• 84
• 110
• 128
• 192
• 193
93 When deploying syslog, which severity level logs informational message?
The highest level is level 0 (emergencies). The lowest level is level 7. By default, the router will
send informational messages (level 6). That means it will send all the syslog messages from level
0 to 6.
• 0
• 2
• 4
• 6
94 What is the role of a firewall in an enterprise network?
• processes unauthorized packets and allows passage to less secure segments of the
network
• determines which packets are allowed to cross from unsecured to secured networks
• forwards packets based on stateless packet inspection
• explicitly denies all packets from entering an administrative domain
95 Refer to the exhibit. Which switch in this configuration will be elected as the root bridge?
SW1: 0C:E0:38:00:36:75
SW2: 0C:0E:15:22:05:97
SW3: 0C:0E:15:1A:3C:9D
SW4: 0C:E0:18:A1:B3:19
• SW1
• SW2
• SW4
• SW3
96 Refer to the exhibit. An administrator must turn off the Cisco Discovery Protocol on the port
configured with last usable address in the 10.0.0.0/30 subnet. Which command set meets the
requirement?
• interface gi0/1
no cdp enable
• interface gi0/1
clear cdp table
• interface gi0/0
no cdp advertise-v2
• interface gi0/0
no cdp run
97 What role does a hypervisor provide for each virtual machine in server virtualization?
• software-as-a-service
• services as a hardware controller
• control and distribution of physical resources
• infrastructure-as-a-service
98 What is the maximum bandwidth of a T1 point-to-point connection?
• 2.048 Mbps
• 34.368 Mbps
• 1.544 Mbps
• 43.7 Mbps
99 What is the same for both copper and fiber interfaces when using SFP modules?
• They support an inline optical attenuator to enhance signal strength
• They accommodate single-mode and multi-mode in a single module
• They provide minimal interruption to services by being hot-swappable
• They offer reliable bandwidth up to 100 Mbps in half duplex mode
100 When a client and server are not on the same physical network, which device is used to forward
requests and replies between client and server for DHCP?
• DHCP server
• DHCP relay agent
• DHCPDISCOVER
• DHCPOFFER
101 Which two WAN architecture options help a business scalability and reliability for the network?
(Choose two)
• static routing
• single-homed branches
• dynamic routing
• dual-homed branches
• asychronous routing
102 What is the name of the layer in the Cisco borderless switched network design that is
considered to be the backbone used for high-speed connectivity and fault isolation?
• data link
• access
• core
• network
• network access
103 Drag and drop the AAA terms from the left onto the description on the right
104 An engineer must establish a trunk link between two switches. The neighboring switch is set to
trunk or desirable mode. What action should be taken?
• configure switchport nonegotiate
• configure switchport mode dynamic auto
• configure switchport trunk dynamic desirable
• configure switchport mode dynamic desirable
105 What must be considered when using 802.11a?
• It is compatible with 802.11g and 802.11-compliant wireless devices
• It is used in place of 802.11b/g when many nonoverlapping channels are required
• It is chosen over 802.11b/g when a lower-cost solution is necessary
• It is susceptible to interference from 2.4 GHz devices such as microwave ovens
106 If a switch port receives a new frame while it is actively transmitting a previous frame, how
does it process the frames?
• The previous frame is delivered, the new frame is dropped, and a retransmission request
is sent.
• The new frame is placed in a queue for transmission after the previous frame.
• The new frame is delivered first, the previous frame is dropped, and a retransmission
request is sent.
• The two frames are processed and delivered at the same time.
107 Which 802.11 management frame type is sent when a client roams between access points on
the same SSID?
• Authentication Request
• Reassociation Request
• Probe Request
• Association Request
108 Refer to the exhibit. The network administrator wants VLAN 67 traffic to be untagged between
Switch 1 and Switch 2 while all other VLANs are to remain tagged. Which command
accomplishes this task?
109 Refer to the exhibit. An access list is required to permit traffic from any host on interface G0/0
and deny traffic from interface Gi0/1. Which access list must be applied?
• Option B
• Option C
• Option D
• Option A
110 In which way does a spine and-leaf architecture allow for scalability in a network when
additional access ports are required?
• A spine switch and a leaf switch can be added with redundant connections between them
• A spine switch can be added with at least 40 GB uplinks
• A leaf switch can be added with connections to every spine switch
• A leaf switch can be added with a single connection to a core spine switch