option
My Daypo

CCNA DRAG AND DROP

COMMENTS STADISTICS RECORDS
TAKE THE TEST
Title of test:
CCNA DRAG AND DROP

Description:
CCNA questions

Author:
AVATAR

Creation Date:
13/04/2022

Category:
Others

Number of questions: 54
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
1. A network engineer is configuring an OSPFv2 neighbor adjacency. Drag and drop the parameters from the left onto their required categories on the right. No all parameters are used. netmask OSPF process ID Router ID IP address area ID timers.
2. Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. Select and Place: Configure BPDU guard Configure dynamic ARP inspection Configure root guard Configure VACL.
3. Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right Select and Place: web policy Passthrough WPA-WPA2 802.1X.
4. Drag and drop the network protocols from the left onto the correct transport services on the right. FTP SMTP SNMP SSH TFTP VoIP.
Drag and drop the networking parameters from the left onto the correct values on the right. Select and Place: default gateway host IP address NIC Mac address NIC vendor OUI subnet mask.
6. Drag and drop the AAA functions from the left onto the correct AAA services on the right. Select and Place: controls the actions that user can perform provides analytical information for the network administrator records user activities restricts the services that are available to a user verifies the password associated with a user indetifies the user.
7. Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right. Select and Place: 172.28.228.144/18 172.28.228.144/21 172.28.228.144/23 172.28.228.144/25 172.28.228.144/29.
8. Drag and drop the descriptions of file transfer protocols from the left onto the correct protocols on the right. Select and Place: provides reliability when loading an IOS image upon boot up does not require user authentication uses port 69 uses port 20 and 21 uses TCP uses UDP.
. Drag drop the descriptions from the left on to the correct configuration-management technologies on the right. Select and Place: fundamental configuration elements are stored in a manifest uses TCP port 10002 for configuration push jobs uses Ruby for fundamental configuration elements uses SSH for remote device communication uses TCP 8140 for communication uses YAML fundamental configuration elements.
10. Drag and drop the WLAN components from the left onto the correct descriptions on the right. Select and Place: access point virtual interface dynamic interface service port wireless LAN controller.
11. Drag and drop the functions from the left onto the correct network components on the right. Select and Place: resolves web URLs to IP address assigns a default gateway to a client holds the TCP/IP settings to be distribuited to the clients stores a list of IP addresses mapped to names assigns IP addresses to enabled clients.
12. Refer to the exhibit Drag and drop the routing table components on the left onto the corresponding letter from the exhibit on the right not all options are used. Select and Place: administrative distance metric next-hop interface outbound interface router source subnet mask timestamp.
13. Drag and drop each broadcast IP address on the left to the Broadcast Address column on the right Not all options are used. Select and Place: 10.1.255.252/24 10.63.255.255/10 172.16.255.39/29 172.20.255.255/16 192.168.1.10/24 192.168.255.127/25.
14. An interface has been configured with the access list that is shown below. access-list 107 deny tcp 207.16.12.0.0.0.3.255 any eq http access-list 107 permit ip any any On the basis of that access list, drag each information packet on the left to the appropriate category on the right. Select and Place: source IP 207.16.32.14, destination application: http source IP 207.16.15.9, destination port: 23 source IP 207.16.14.7, destination port: 80 source 207.16.13.14, destination application: http source IP 207.16.16.14, destination port: 53.
15. Order the DHCP message types as they would occur between a DHCP client and a DHCP server. Select and Place: DHCP ACK DHCP OFFER DHCP DISCOVER DHCP REQUEST.
16. Drag each route source from the left to the numbers on the right. Beginning with the lowest and ending with the highest administrative distance. CONNNECTED EBGP EIGRP OSPF RIP STATIC.
17. Drag and drop the benefits of a cisco wireless Lan controller from the left onto the correct examples on the right. Dynamic RF Feature Easy Deployment Process Optimized user performance Easy upgrade process.
18. Drag and drop the application protocols from the left onto the transport protocols that is uses on the right. DHCP FTP SMTP SSH SNMP TFTP.
19. Refer to the exhibit. Drag and drop the networking parameters from the left on to the correct values on the right. default gateway host IP address NIC MAC address NIC vendor OUI subnet mask.
20. Drag and drop the networking parameters from the left on to the correct values on the right. SMTP SNMP TFTP VoIP SSH FTP.
21. Drag and drop the characteristics of networking from the left onto the correct networking types on the right focused on network focused on devices user input is a configuration user input is a policy uses white list security model uses black list security model.
22. Drag and drop the attack-mitigation techniques from the left onto the Types of attack that they mitigate on the right. configure 802.1x authenticate configure DHCP snooping configure the native VLAN with a nondefault VLAN ID disable DTP.
23. Match the functions to the corresponding layers. (Not all options are used.) provides high-speed backbone connectivity implements personal firewalls on the client computers provides network access to the user implements network access policy represents the network edge establishes Layer 3 routing boundaries functions as an aggregator for all the campus blocks.
24. Drag the descriptions of device management from the left onto the types of device management on the right Implements changes via an SSH terminal Manages device configuration on a per-device-basis Monitor the cloud for software update Security is managed near the perimeter of the network with firewalls, VPNS and IPS Uses CLI templates to apply a consistent consiguration to multiple devices at an individual location Uses NetFlow to analyse potential security threats throughput the network and take approppriate action on that traffic.
25. Drag the descriptions of IP protocol transmissions from the left onto the IP traffic types on the right. Sends transmissions in sequence Transmissions include an 8-byte header Transmits packets as a stream Transmits packets individually Uses a higher transmission rate to support latency-sensitive application Uses a lower transmission rate to ensure reliability.
26. Drag and drop to the characteristics of networking from the left onto the correct networking types on the right. focused on network focused on devices user input is a configuration user input is a policy user white list security model user black list model.
27. Refer to the exhibit. An engineer is tasked with verifying network configuration parameters on a client workstation to report back to the team lead. Drag and drop the node identifiers from the left onto the network parameters on the right. 192.168.1.1 192.168.1.20 192.168.1.254 192.168.1.255 B8-76-3F-7C-57-DF.
29. Drag and drop the SNMP components from the left onto the descriptions on the right. MIB SNMP agent SNMP manager SNMP trap.
28. Drag the IPv6 DNS record types from the left onto the description on the right. AAAA CNAME NS PTR SOA.
30. Drag and drop the QoS congestion management terms from the left onto the description on the right. CBWGQ CQ FIFO PQ WFQ.
31. Drag and drop the DHCP snooping terms from the left onto the descriptions on the right. DHCP server snooping binding database spurious DHCP server trusted untrusted.
32. Refer to the exhibit. An engineer is configuring the router to provide static NAT for the webserver Drag and drop the configuration commands from the left onto the letters that correspond to its position in the configuration on the right. ip address 172.16.1.1 255.255.255.0 ip address 45.83.2.214 255.255.255.240 ip nat inside ip nat inside source list 1 interface s0 overload ip nat inside source static tcp 172.16.1.2 80 45.83.2.214 80 extendable ip nat outside.
33. Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right. single device handles the core and the distribution layer enhaces network availability more cost-effective than other options most appropriate for small network designs separate devices handle the core and the distribution layer.
34. Drag and drop the SNMP manager and agent identifier commands from the left onto the functions on the right show snmp chassis show snmp community show snmp engineID show snmp group show snmp host.
35. Drag and drop the TCP/IP protocols from the left onto the transmission protocols on the right DNS SMTP SNMP HTTP RTP Telnet.
36. Drag and drop the 802.11 wireless standards from the left onto the matching statements on the right 802.11a 802.11ac 802.11b 802.11g 802.11n.
37. Drag and drop the functions of DHCP from the left onto any of the positions on the right (Not all functions are used) provides local control for network segments using a client server scheme reduces the administrative burden for onboarding end users associates hostnames to IP addresses maintains an address pool assigns IP addresses to local hosts for a configurable lease time offers domain name server configuration uses authoritative servers for record keeping.
38. Drag and drop the IPv6 address type characteristics from the left to the right attached to a single subnet addresses with prefix FC00::/7 configured only once per interface addressing for exclusive user internally without Internet routing.
39. An engineer is configuring an encrypted password for the enable command on a router where the local user database has already been configured. Drag and drop the configuration commands from the left into the correct sequence on the right (Not all commands are used) configure terminal enable enable secret $hfl@4fs exit line vty 0 4 service password-encryption.
40. Drag and drop the statement about networking from the left into the Corresponding networking types on the right. Not all statements are used. This type deploys a consistent configuration accross multiple devices A distributed control plane is needed This type requires a distribuyted mangement plane Southbound APIs are used to apply configurations Northbound APIs interact with end devices.
41. Drag and drop the DNS lookup components from the left onto the functions on the right. Cache DNS domain name resolver no ip domain-lookup.
42. Drag and drop the AAA terms from the left onto the description on the right. accounting authentication authorization CoA.
43. Drag and drop the lightweight access point operation modes from the left onto the descriptions on the right bridge mode local mode monitor mode Flexconnect mode rogue detector mode sniffer mode.
44. Drag the descriptions of device management from the left onto the types of device management on the right. requires configuration on a device-by-device basis networking functions are implemented primarily on dedicated devices requires manual troubleshooting collects statistics and telemetry data from multiple network devices and provides a single view of network health and issues uses an inventory function to store device details in the database uses machine learning ro identify and resolve issues.
45. Drag and drop the statements about networking from the left onto the corresponding networking types on the right. This type allows better control over how networks work and how networks are configued This type enables networks to integrate with applications through APIs New devices are configured using the physical infrastructure This type provisions resources from a centralized location This type requires a distributed control plane.
46. Drag and drop the Rapid PVST+ forwarding slate actions from the loft to the right. Not all actions are used. BPDUs received are forwarded to the systrem module BPDUs received from the system module are processed and transmitted Frames received from the attached segment are discarded Frames received from the attached segment are processed Switched frames received from other ports are advanced The port in the forwarding state responds to network management messages.
47. Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right. transmitted based on data contained in the packet without the need for a data channel requires the client and the server to establish a connection before sending the packet used to realiably share files between devices appropriate for streaming operations with minimal latency.
48. Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used. supports automatic deployment managed from a web-based dashboard accessible for management via Telnet, SSH, or a web GUI configured and managed by a WLC requires a management IP address.
50. An engineer is tasked to configure a switch with port security to ensure devices that forward unicasts multicasts and broadcasts are unable to flood the port The port must be configured to permit only two random MAC addresses at a time Drag and drop the required configuration commands from the left onto the sequence on the right Not all commands are used. switchport mode access switchport port-security switchport port-security mac-address 0060.3EDD.77AB switchport port-security mac-address 00D0.D3ED.622A switchport port-security mac-address sticky switchport port-security maximum 2 switchport port-security violation shutdown.
51. Drag and drop the IPv6 address details from the left onto the corresponding types on the right. identifies an interface on an IPV6 device includes link-local and loopback addresses provides one-to-many communications used exclusively by a non-host device assigned to more than one interface derived from the FF00::/8 address range.
52. Drag and drop each characteristic of device-management technologies from the left onto the deployment type on the right. relies on per-device management uses individual software management orchestrates background device configuration supports open APIs provides greater flexibility for custom and non-standard configurations supports centralized software management.
53. Drag and drop the descriptions of AAA services from the left onto the corresponding services on the right. allows the user to change to enable mode limits the user's access permissions logs session statistics records user commands secure access to routers validates user credentials.
54. Drag and drop the functions of AAA supporting protocols from the left onto the protocols on the right. encrypts only the password when it sends an access request encrypts the entire body of the access-request packet separates all three AAA operations combines authentication and authorization uses TCP uses UDP.
55. Drag and drop the HTTP methods used with REST-based APIs from the left onto the descriptions on the right. DELETE GET POST PATCH PUT.
Report abuse Terms of use
HOME
CREATE TEST
COMMENTS
STADISTICS
RECORDS
Author's Tests