option
Questions
ayuda
daypo
search.php

CCNA2_Final_Exam _Q61-Q80

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNA2_Final_Exam _Q61-Q80

Description:
CCNA 2 v7.0 Final Exam Answers Full – using itexamanswers.net

Creation Date: 2025/11/27

Category: Computers

Number of questions: 20

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

61. Refer to the exhibit. A network administrator is reviewing the configuration of switch S1. Which protocol has been implemented to group multiple physical ports into one logical link?. PAgP. DTP. LACP. STP.

62. Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?. floating static route. default static route. summary static route. standard static route.

63. What action takes place when a frame entering a switch has a unicast destination MAC address appearing in the MAC address table?. The switch updates the refresh timer for the entry. The switch forwards the frame out of the specified port. The switch purges the entire MAC address table. The switch replaces the old entry and uses the more current port.

64. The exhibit shows two PCs called PC A and PC B, two routes called R1 and R2, and two switches. PC A has the address 172.16.1.1/24 and is connected to a switch and into an interface on R1 that has the IP address 172.16.1.254. PC B has the address 172.16.2.1/24 and is connected to a switch that is connected to another interface on R1 with the IP address 172.16.2.254. The serial interface on R1 has the address 172.16.3.1 and is connected to the serial interface on R2 that has the address 172.16.3.2/24. R2 is connected to the internet cloud. Which command will create a static route on R2 in order to reach PC B?. R2(config)# ip route 172.16.2.1 255.255.255.0 172.16.3.1. R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.2.254. R2(config)# ip route 172.16.2.0 255.255.255.0 172.16.3.1. R2(config)# ip route 172.16.3.0 255.255.255.0 172.16.2.254.

65. What protocol or technology allows data to transmit over redundant switch links?. EtherChannel. DTP. STP. VTP.

66. Refer to the exhibit. Which three hosts will receive ARP requests from host A, assuming that port Fa0/4 on both switches is configured to carry traffic for multiple VLANs? (Choose three.). host B. host C. host D. host E. host F. host G.

67. Refer to the exhibit. The network administrator configures both switches as displayed. However, host C is unable to ping host D and host E is unable to ping host F. What action should the administrator take to enable this communication?. Associate hosts A and B with VLAN 10 instead of VLAN 1. Configure either trunk port in the dynamic desirable mode. Include a router in the topology. Remove the native VLAN from the trunk. Add the switchport nonegotiate command to the configuration of SW2.

68. What is the effect of entering the shutdown configuration command on a switch?. It enables BPDU guard on a specific port. It disables an unused port. It enables portfast on a specific switch interface. It disables DTP on a non-trunking interface.

69. What would be the primary reason an attacker would launch a MAC address overflow attack?. so that the switch stops forwarding traffic. so that legitimate hosts cannot obtain a MAC address. so that the attacker can see frames that are destined for other hosts. so that the attacker can execute arbitrary code on the switch.

70. During the AAA process, when will authorization be implemented?. Immediately after successful authentication against an AAA data source. Immediately after AAA accounting and auditing receives detailed reports. Immediately after an AAA client sends authentication information to a centralized server. Immediately after the determination of which resources a user can access.

71. A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?. auto secure MAC addresses. dynamic secure MAC addresses. static secure MAC addresses. sticky secure MAC addresses.

72. Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.). 802.11a. 802.11b. 802.11g. 802.11n. 802.11ac.

73. To obtain an overview of the spanning tree status of a switched network, a network engineer issues the show spanning-tree command on a switch. Which two items of information will this command display? (Choose two.). The root bridge BID. The role of the ports in all VLANs. The status of native VLAN ports. The number of broadcasts received on each root port. The IP address of the management VLAN interface.

74. Refer to the exhibit. Which trunk link will not forward any traffic after the root bridge election process is complete?. Trunk1. Trunk2. Trunk3. Trunk4.

75. Which method of IPv6 prefix assignment relies on the prefix contained in RA messages?. EUI-64. SLAAC. static. stateful DHCPv6.

76. Which two protocols are used to provide server-based AAA authentication? (Choose two.). 802.1x. SSH. SNMP. TACACS+. RADIUS.

77. A network administrator is configuring a WLAN. Why would the administrator disable the broadcast feature for the SSID?. to eliminate outsiders scanning for available SSIDs in the area. to reduce the risk of interference by external devices such as microwave ovens. to reduce the risk of unauthorized APs being added to the network. to provide privacy and integrity to wireless traffic by using encryption.

78. Which mitigation technique would prevent rogue servers from providing false IP configuration parameters to clients?. implementing port security. turning on DHCP snooping. disabling CDP on edge ports. implementing port-security on edge ports.

79. A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with the unknown source MAC address is dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port?. shutdown. restrict. warning. protect.

80. What protocol or technology defines a group of routers, one of them defined as active and another one as standby?. EtherChannel. VTP. HSRP. DTP.

Report abuse