option
Questions
ayuda
daypo
search.php

CCNA2 Final Exam Q81-Q100

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
CCNA2 Final Exam Q81-Q100

Description:
CCNA 2 v7.0 Final Exam Answers Full – using itexamanswers.net

Creation Date: 2025/11/28

Category: Computers

Number of questions: 20

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

81. Refer to the exhibit. After attempting to enter the configuration that is shown in router RTA, an administrator receives an error and users on VLAN 20 report that they are unable to reach users on VLAN 30. What is causing the problem?. There is no address on Fa0/0 to use as a default gateway. RTA is using the same subnet for VLAN 20 and VLAN 30. Dot1q does not support subinterfaces. The no shutdown command should have been issued on Fa0/0.20 and Fa0/0.30.

82. Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.). dynamic auto - dynamic auto. access - trunk. dynamic desirable - trunk. access - dynamic auto. dynamic desirable - dynamic desirable. dynamic desirable - dynamic auto.

83. A technician is configuring a router for a small company with multiple WLANs and doesn’t need the complexity of a dynamic routing protocol. What should be done or checked?. Verify that there is not a default route in any of the edge router routing tables. Create static routes to all internal networks and a default route to the internet. Create extra static routes to the same location with an AD of 1. Check the statistics on the default route for oversaturation.

84. A company is deploying a wireless network in the distribution facility in a Boston suburb. The warehouse is quite large and it requires multiple access points to be used. Because some of the company devices still operate at 2.4GHz, the network administrator decides to deploy the 802.11g standard. Which channel assignments on the multiple access points will make sure that the wireless channels are not overlapping?. channels 1, 5, and 9. channels 1, 6, and 11. channels 1, 7, and 13. channels 2, 6, and 10.

85. A network administrator of a small advertising company is configuring WLAN security by using the WPA2 PSK method. Which credential do office users need in order to connect their laptops to the WLAN?. the company username and password through Active Directory service. a key that matches the key on the AP. a user passphrase. a username and password configured on the AP.

86. Refer to the exhibit. What are the possible port roles for ports A, B, C, and D in this RSTP-enabled network?. alternate, designated, root, root. designated, alternate, root, root. alternate, root, designated, root. designated, root, alternate, root.

87. Refer to the exhibit. Which static route would an IT technician enter to create a backup route to the 172.16.1.0 network that is only used if the primary RIP learned route fails?. ip route 172.16.1.0 255.255.255.0 s0/0/0. ip route 172.16.1.0 255.255.255.0 s0/0/0 121. ip route 172.16.1.0 255.255.255.0 s0/0/0 111. ip route 172.16.1.0 255.255.255.0 s0/0/0 91.

88. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow?. Disable DTP. Disable STP. Enable port security. Place unused ports in an unused VLAN.

89. A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service?. Requiring the users to switch to the 5 GHz band for streaming media is inconvenient and will result in fewer users accessing these services. The 5 GHz band has more channels and is less crowded than the 2.4 GHz band, which makes it more suited to streaming multimedia. The 5 GHz band has a greater range and is therefore likely to be interference-free. The only users that can switch to the 5 GHz band will be those with the latest wireless NICs, which will reduce usage.

90. Which DHCPv4 message will a client send to accept an IPv4 address that is offered by a DHCP server?. broadcast DHCPACK. broadcast DHCPREQUEST. unicast DHCPACK. unicast DHCPREQUEST.

91. Refer to the exhibit. Which destination MAC address is used when frames are sent from the workstation to the default gateway?. MAC address of the virtual router. MAC address of the standby router. MAC addresses of both the forwarding and standby routers. MAC address of the forwarding router.

92. After a host has generated an IPv6 address by using the DHCPv6 or SLAAC process, how does the host verify that the address is unique and therefore usable?. The host sends an ICMPv6 echo request message to the DHCPv6 or SLAAC-learned address and if no reply is returned, the address is considered unique. The host sends an ICMPv6 neighbor solicitation message to the DHCP or SLAAC-learned address and if no neighbor advertisement is returned, the address is considered unique. The host checks the local neighbor cache for the learned address and if the address is not cached, it it considered unique. The host sends an ARP broadcast to the local link and if no hosts send a reply, the address is considered unique.

93. Match the purpose with its DHCP message type. (Not all options are used.). a message that is used to locate any available DHCP server on a network. a message that is used to identify the explicit server and lease offer to accept. a message that is used to acknowledge that the lease is successful. a message that is used to suggest a lease to a client.

94. Which protocol adds security to remote connections?. FTP. HTTP. NetBEUI. POP. SSH.

95. Refer to the exhibit. A network administrator is verifying the configuration of inter-VLAN routing. Users complain that PC2 cannot communicate with PC1. Based on the output, what is the possible cause of the problem?. Gi0/0 is not configured as a trunk port. The command interface GigabitEthernet0/0.5 was entered incorrectly. There is no IP address configured on the interface Gi0/0. The no shutdown command is not entered on subinterfaces. The encapsulation dot1Q 5 command contains the wrong VLAN.

96. Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?. It identifies the subinterface. It identifies the VLAN number. It identifies the native VLAN number. It identifies the type of encapsulation that is used. It identifies the number of hosts that are allowed on the interface.

97. Match each DHCP message type with its description. (Not all options are used.). DHCPACK. DHCPREQUEST. DHCPNACK. DHCPDISCOVER. DHCPOFFER.

98. What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease?. IP address spoofing. DHCP starvation. CAM table attack. DHCP spoofing.

99. Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?. The DNS server and the default gateway router should be in the same subnet. The IP address of the default gateway router is not contained in the excluded address list. The default-router and dns-server commands need to be configured with subnet masks. The IP address of the DNS server is not contained in the excluded address list.

100. Refer to the exhibit. A network administrator has added a new subnet to the network and needs hosts on that subnet to receive IPv4 addresses from the DHCPv4 server. What two commands will allow hosts on the new subnet to receive addresses from the DHCP4 server? (Choose two.). R1(config-if)# ip helper-address 10.2.0.250. R1(config)# interface G0/1. R1(config)# interface G0/0. R2(config-if)# ip helper-address 10.2.0.250. R2(config)# interface G0/0. R1(config-if)# ip helper-address 10.1.0.254.

Report abuse