CCNA2_Final_Exam _Q1-Q20
|
|
Title of test:
![]() CCNA2_Final_Exam _Q1-Q20 Description: CCNA 2 v7.0 Final Exam Answers Full – using itexamanswers.net |



| New Comment |
|---|
NO RECORDS |
|
1. Refer to the exhibit. What will router R1 do with a packet that has a destination IPv6 address of 2001:db8:cafe:5::1?. forward the packet out GigabitEthernet0/0. drop the packet. forward the packet out GigabitEthernet0/1. forward the packet out Serial0/0/0. 2. Refer to the exhibit. Currently router R1 uses an EIGRP route learned from Branch2 to reach the 10.10.0.0/16 network. Which floating static route would create a backup route to the 10.10.0.0/16 network in the event that the link between R1 and Branch2 goes down?. ip route 10.10.0.0 255.255.0.0 Serial 0/0/0 100. ip route 10.10.0.0 255.255.0.0 209.165.200.226 100. ip route 10.10.0.0 255.255.0.0 209.165.200.225 100. ip route 10.10.0.0 255.255.0.0 209.165.200.225 50. 3. Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?. Add an administrative distance of 254. Change the destination network and mask to 0.0.0.0 0.0.0.0. Change the exit interface to S0/0/1. Add the next-hop neighbor address of 209.165.200.226. 4. Which option shows a correctly configured IPv4 default static route?. ip route 0.0.0.0 255.255.255.0 S0/0/0. ip route 0.0.0.0 0.0.0.0 S0/0/0. ip route 0.0.0.0 255.255.255.255 S0/0/0. ip route 0.0.0.0 255.0.0.0 S0/0/0. 5. Refer to the exhibit. Which static route command can be entered on R1 to forward traffic to the LAN connected to R2?. ipv6 route 2001:db8:12:10::/64 S0/0/0. ipv6 route 2001:db8:12:10::/64 S0/0/1 fe80::2. ipv6 route 2001:db8:12:10::/64 S0/0/0 fe80::2. ipv6 route 2001:db8:12:10::/64 S0/0/1 2001:db8:12:10::1. 6. What is a method to launch a VLAN hopping attack?. introducing a rogue switch and enabling trunking. sending spoofed native VLAN information. sending spoofed IP addresses from the attacking host. flooding the switch with MAC addresses. 7. A cybersecurity analyst is using the macof tool to evaluate configurations of switches deployed in the backbone network of an organization. Which type of LAN attack is the analyst targeting during this evaluation?. VLAN hopping. DHCP spoofing. MAC address table overflow. VLAN double-tagging. 8. Refer to the exhibit. A network administrator is configuring a router as a DHCPv6 server. The administrator issues a show ipv6 dhcp pool command to verify the configuration. Which statement explains the reason that the number of active clients is 0?. The default gateway address is not provided in the pool. No clients have communicated with the DHCPv6 server yet. The IPv6 DHCP pool configuration has no IPv6 address range specified. The state is not maintained by the DHCPv6 server under stateless DHCPv6 operation. 9. Refer to the exhibit. A network administrator configured routers R1 and R2 as part of HSRP group 1. After the routers have been reloaded, a user on Host1 complained of lack of connectivity to the Internet The network administrator issued the show standby brief command on both routers to verify the HSRP operations. In addition, the administrator observed the ARP table on Host1. Which entry should be seen in the ARP table on Host1 in order to gain connectivity to the Internet?. the virtual IP address and the virtual MAC address for the HSRP group 1. the virtual IP address of the HSRP group 1 and the MAC address of R1. the virtual IP address of the HSRP group 1 and the MAC address of R2. the IP address and the MAC address of R1. 10. Match the forwarding characteristic to its type. (Not all options are used.). cut-through. store-and-forward. 11. Which statement is correct about how a Layer 2 switch determines how to forward frames?. Frame forwarding decisions are based on MAC address and port mappings in the CAM table. Only frames with a broadcast destination address are forwarded out all active switch ports. Unicast frames are always forwarded regardless of the destination MAC address. Cut-through frame forwarding ensures that invalid frames are always dropped. 12. Which statement describes a result after multiple Cisco LAN switches are interconnected?. The broadcast domain expands to all switches. One collision domain exists per switch. There is one broadcast domain and one collision domain per switch. Frame collisions increase on the segments connecting the switches. Unicast frames are always forwarded regardless of the destination MAC address. 13. Match the link state to the interface and protocol status. (Not all options are used.). Disabled. Layer 1 problem. Layer 2 problem. Operational. 14.Refer to the exhibit. How is a frame sent from PCA forwarded to PCC if the MAC address table on switch SW1 is empty?. SW1 forwards the frame directly to SW2. SW2 floods the frame to all ports connected to SW2, excluding the port through which the frame entered the switch. SW1 floods the frame on all ports on the switch, excluding the interconnected port to switch SW2 and the port through which the frame entered the switch. SW1 floods the frame on all ports on SW1, excluding the port through which the frame entered the switch. SW1 drops the frame because it does not know the destination MAC address. 15. An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?. Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted. These VLANs cannot be deleted unless the switch is in VTP client mode. These VLANs are default VLANs that cannot be removed. These VLANs can only be removed from the switch by using the no vlan 10 and no vlan 100 commands. 16. Match the description to the correct VLAN type. (Not all options are used.). Native VLAN. Management VLAN. Default VLAN. Data VLANs. 17. Refer to the exhibit. A network administrator has connected two switches together using EtherChannel technology. If STP is running, what will be the end result?. STP will block one of the redundant links. The switches will load balance and utilize both EtherChannels to forward packets. The resulting loop will create a broadcast storm. Both port channels will shutdown. 18. What is a secure configuration option for remote access to a network device?. Configure an ACL and apply it to the VTY lines. Configure 802.1x. Configure SSH. Configure Telnet. 19. Which wireless encryption method is the most secure?. WPA2 with AES. WPA2 with TKIP. WEP. WPA. 20. After attaching four PCs to the switch ports, configuring the SSID and setting authentication properties for a small office network, a technician successfully tests the connectivity of all PCs that are connected to the switch and WLAN. A firewall is then configured on the device prior to connecting it to the Internet. What type of network device includes all of the described features?. firewall appliance. wireless router. switch. standalone wireless access point. |





