CCNA (200-120) / 60questions 60minuts / EN

Descripción

CCNA 200-120 (CCNA 5.0 EN) CCNA 5.0 Test sobre CCNA (200-120) / 60questions 60minuts / EN, creado por Almery M. el 16/03/2016.
Almery M.
Test por Almery M., actualizado hace más de 1 año
Almery M.
Creado por Almery M. hace más de 8 años
35
1

Resumen del Recurso

Pregunta 1

Pregunta
How should you power up a Cisco router?
Respuesta
  • Press the Reset button.
  • Turn the power switch to “on.”
  • Connect the fiber cable to another router.
  • Attach the power cable plug to the router power supply socket.

Pregunta 2

Pregunta
How do you instruct a Cisco device to parse and execute an entered command?
Respuesta
  • Press the Send key
  • Press the Enter key
  • Add a space at end of the command
  • Wait 5 seconds after you enter the command

Pregunta 3

Pregunta
Which Cisco router component is used primarily to store the startup-config file?
Respuesta
  • RAM
  • ROM
  • NVRAM
  • Flash memory
  • Configuration register

Pregunta 4

Pregunta
If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do?
Respuesta
  • Ignores the update
  • Increments the holddown timer
  • Marks the network as “accessible” and removes the holddown timer
  • Marks the network as “accessible” but keeps the holddown timer on

Pregunta 5

Pregunta
How could you obtain CDP information about a remote device that is not directly connected?
Respuesta
  • Use the command show cdp neighbors’ address.
  • Use the command show cdp neighbors’ hostname.
  • Use SSH or Telnet to access a Cisco device connected to the target device.
  • It is not possible to obtain CDP information about a remote device.

Pregunta 6

Pregunta
Which address type from IPv4 was eliminated in IPv6?
Respuesta
  • Unicast
  • Multicast
  • Broadcast
  • Everycast

Pregunta 7

Pregunta
Set of networks subject to translation using NAT.
Respuesta
  • Static NAT
  • Dynamic NAT
  • Inside network
  • Outside global IP address

Pregunta 8

Pregunta
If a router does not match the appropriate address portions to a number on its routing table, it [blank_start].[blank_end]
Respuesta
  • sends the packet back to the sender.
  • passes the packet to the next router in.
  • adds that number to its table.
  • discards the packet.

Pregunta 9

Pregunta
How many subnets are gained by subnetting 172.17.32.0/20 into multiple /28 subnets?
Respuesta
  • 16
  • 32
  • 256
  • 1024

Pregunta 10

Pregunta
Which of the following describes the DHCP server provided by Cisco IOS?
Respuesta
  • It is a full DHCP server
  • Its support is limited to assigning IP addresses to clients.
  • It has to get is DHCP information for a master DHCP server.
  • It has limited DHCP support and can only assign IP addresses and default gateways to clients.

Pregunta 11

Pregunta
How can you most effectively summarize the IP range of addresses from 172.168.12.0/24 through 172.168.13.0/24?
Respuesta
  • 172.168.12.0/23
  • 172.168.12.0/22
  • 172.168.12.0/21
  • 172.168.12.0/20

Pregunta 12

Pregunta
A subnet mask tells the router to look at which portions of an IP address?
Respuesta
  • Mask and host bits
  • Host and network bits
  • Host and subnet bits
  • Network and subnet bits

Pregunta 13

Pregunta
If a route for a network is in holddown and an update arrives from a neighboring router with the same metric as was originally recorded for the network, what does the router do?
Respuesta
  • Ignores the update
  • Increments the holddown timer
  • Marks the network as “accessible” and removes the holddown timer
  • Marks the network as “accessible” but keeps the holddown timer on

Pregunta 14

Pregunta
What is the decimal equivalent of the binary number 11000111?
Respuesta
  • 218
  • 199
  • 179
  • 208

Pregunta 15

Pregunta
What does split horizon specify?
Respuesta
  • That information about a route should not be sent in any direction
  • That information about a route should not be sent back in the direction that the original information came from
  • That information about a route should always be sent back in the direction that the original information came from
  • That information about a route should be sent back only in the direction that the original information came from

Pregunta 16

Pregunta
The binary number 11101000111 converted into a decimal number, using powers of 2, is [blank_start].[blank_end]
Respuesta
  • 1183.
  • 1873.
  • 1638.
  • 1863.

Pregunta 17

Pregunta
In which situation is an administrative distance required?
Respuesta
  • whenever static routes are defined
  • whenever dynamic routing is enabled
  • when the same route is learned via multiple routing sources
  • when multiple paths are available to the same destination and they are all learned via the same routing protocol

Pregunta 18

Pregunta
What is the RSTP equivalent to the STP listening state?
Respuesta
  • Blocking
  • Listening
  • Discarding
  • Forwarding

Pregunta 19

Pregunta
Which statement is true of a port in the listening state?
Respuesta
  • The port is able to check for BPDUs and populate the MAC table.
  • The port is able to check for BPDUs, but not yet populate its MAC table.
  • The port is able to populate its MAC table, but not yet forward user frames.
  • The port is able to forward user frames, but not yet populate its MAC table.

Pregunta 20

Pregunta
Which of the following is a customized text that is displayed before the username and password login prompts?
Respuesta
  • Message Of the Day
  • Login banner
  • User banner
  • Warning message

Pregunta 21

Pregunta
With RSTP, which two port roles are included in the active topology?
Respuesta
  • Root and alternate
  • Root and designated
  • Alternate and backup
  • Designated and backup

Pregunta 22

Pregunta
Which term commonly describes the endless flooding or looping of frames?
Respuesta
  • Flood storm
  • Loop overload
  • Broadcast storm
  • Broadcast overload

Pregunta 23

Pregunta
Regarding STP, what is the state of a nondesignated port?
Respuesta
  • Blocking
  • Learning
  • Listening
  • Forwarding

Pregunta 24

Pregunta
Which of the following is the most secure method of remotely accessing a network device?
Respuesta
  • http
  • telnet
  • ssh
  • rmon
  • snmp

Pregunta 25

Pregunta
When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware?
Respuesta
  • MTU 1500 bytes
  • Hardware is … 10BaseT
  • Address is 0050.BD73.E2C1
  • 802.1d STP State: Forwarding

Pregunta 26

Pregunta
Which term describes multiple copies of a frame arriving on different ports of a switch?
Respuesta
  • Flood storm
  • Multiple frame transmission
  • MAC database instability
  • Loop overload

Pregunta 27

Pregunta
Which show command requires that you have privileged EXEC mode access?
Respuesta
  • show ip
  • show version
  • show running
  • show interfaces

Pregunta 28

Pregunta
What are TWO major benefits of adding a bridge to a network?
Respuesta
  • Isolating potential network problems to specific segments
  • Increasing the speed of a network
  • Extending a LAN to cover greater distances by joining multiple segments
  • Creating fewer collision domains
  • Forwarding data frames between LAN segments

Pregunta 29

Pregunta
When a single computer with one IP address has several websites open at once, this is called [blank_start].[blank_end]
Respuesta
  • windowing.
  • session multiplexing.
  • segmenting.
  • connection-oriented protocol.

Pregunta 30

Pregunta
If the POST tests complete successfully on a Catalyst switch, what display could you see on the console?
Respuesta
  • The > prompt
  • The privileged EXEC prompt
  • The Management Console logon screen
  • A list of commands available on the switch

Pregunta 31

Pregunta
Which information does the show vlan command display?
Respuesta
  • VTP domain parameters
  • VMPS server configuration parameters
  • Which ports are configured as trunks
  • Names of the VLANs and the ports assigned to the VLANs

Pregunta 32

Pregunta
What are TWO reasons for using 802.1Q?
Respuesta
  • To allow switches to share a trunk link with non-trunking clients
  • To allow clients to see the 802.1Q header
  • To provide inter-VLAN communications over a bridge
  • To load-balance traffic between parallel links using the Spanning Tree Protocol
  • To provide trunking between Cisco switches and other vendor switches

Pregunta 33

Pregunta
Which CLI prompt indicates that you are working in privileged EXEC mode?
Respuesta
  • hostname#
  • hostname>
  • hostname-exec>
  • hostname-config

Pregunta 34

Pregunta
What are the TWO most common IPv4-to-IPv6 transition techniques?
Respuesta
  • IPv6 NAT
  • dual stack
  • 6to4 tunnels
  • IPv6 mobile

Pregunta 35

Pregunta
Which TWO pieces of information are included in a CDP update packet?
Respuesta
  • platform
  • routing updates
  • device identifiers
  • MAC Address list
  • link speed

Pregunta 36

Pregunta
Which TWO statements are true regarding dual stack?
Respuesta
  • A new API replaces gethostbyname and gethostbyaddr calls.
  • Tunneling is automatic.
  • Dual stack prefers IPv4 over IPv6.
  • You cannot use IPv4 while converting to IPv6.
  • The stack to use is chosen based on destination address.

Pregunta 37

Pregunta
How can you most effectively summarize the IP range of addresses from 10.1.32.0 through 10.1.35.255?
Respuesta
  • 10.1.32.0/23
  • 10.1.32.0/22
  • 10.1.32.0/21
  • 10.1.32.0/20

Pregunta 38

Pregunta
How do you start a Catalyst 2950 series switch?
Respuesta
  • Press the on/off switch.
  • Power up the redundant power supply.
  • Connect a network cable to another switch on the network.
  • Attach the power cable plug to the switch power supply socket.

Pregunta 39

Pregunta
Which Cisco IOS command should you use to set the clock speed to 64 kbps on a serial interface on a Cisco router?
Respuesta
  • clock rate 64
  • clock speed 64
  • clock rate 64000
  • clock speed 64000

Pregunta 40

Pregunta
OSPF routes packets within a single [blank_start].[blank_end]
Respuesta
  • area.
  • network.
  • segment.
  • autonomous system.

Pregunta 41

Pregunta
Which Cisco IOS command creates a message to be displayed upon router login?
Respuesta
  • hostname hostname
  • banner motd message
  • hostname interface description
  • description interface description

Pregunta 42

Pregunta
Which Cisco IOS command is used to return to user EXEC mode from the privileged EXEC mode?
Respuesta
  • exit>
  • quit
  • disable
  • userexec

Pregunta 43

Pregunta
Which access level allows a person to access all router commands and can be password protected to allow only authorized individuals to access the router?
Respuesta
  • user EXEC level
  • setup EXEC level
  • enable EXEC level
  • privileged EXEC level

Pregunta 44

Pregunta
Which component of security ensures the data has not been tampered with?
Respuesta
  • Authentication
  • Integrity
  • Confidentiality
  • Anti-Playback

Pregunta 45

Pregunta
Which organization offers certification for interoperability between vendors of 802.11 products?
Respuesta
  • Wi-Fi
  • IEEE
  • EMA
  • WISC

Pregunta 46

Pregunta
Which THREE are the steps to secure a WLAN?
Respuesta
  • Encryption for providing privacy and confidentiality
  • Authentication to ensure that legitimate clients and users access the network via trusted access points
  • Controls transmit power to limit the AP access range to the property boundaries of the parent organization
  • Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs

Pregunta 47

Pregunta
What are THREE characteristics of Ethernet 802.3?
Respuesta
  • based on the CSMA/CD process
  • a standard that has been replaced by Ethernet II
  • specifies the physical layer (Layer 1)
  • developed in the mid-1970s
  • specifies the MAC portion of the data link layer (Layer 2)
  • also referred to as thick Ethernet

Pregunta 48

Pregunta
Which TWO of these addresses are private IP addresses?
Respuesta
  • 10.215.34.124
  • 127.16.71.43
  • 172.17.10.10
  • 225.200.15

Pregunta 49

Pregunta
How many bits are in an IPv4 address?
Respuesta
  • 16
  • 32
  • 48
  • 64
  • 128

Pregunta 50

Pregunta
Encapsulates the network layer packet in a frame.
Respuesta
  • Network layer
  • Datalink layer
  • Physical layer

Pregunta 51

Pregunta
Occurs when RF waves are soaked up by walls.
Respuesta
  • Absorption
  • Reflection
  • Scattering

Pregunta 52

Pregunta
How many bits are in an IPv6 address?
Respuesta
  • 16
  • 32
  • 48
  • 64
  • 128

Pregunta 53

Pregunta
Provides applications for file transfer, network troubleshooting, and Internet activities, and supports the network
Respuesta
  • Physical layer
  • Datalink layer
  • Internet layer
  • Transport layer
  • Application layer

Pregunta 54

Pregunta
Encodes the data-link frame into a pattern of 1s and 0s (bits) for transmission on the medium (usually a wire).
Respuesta
  • Network layer
  • Datalink layer
  • Physical layer

Pregunta 55

Pregunta
Which of the following four attacks are classified as access attacks? (choose one or more)
Respuesta
  • Password attacks
  • DDoS
  • Trojan horse
  • Love Bug

Pregunta 56

Pregunta
Which THREE statements about TCP are accurate?
Respuesta
  • TCP operates at Layer 3 of the TCP/IP stack.
  • TCP is a connection-oriented protocol.
  • TCP provides no error checking.
  • TCP packets are numbered and sequenced so that the destination can reorder packets and determine if a packet is missing.
  • TCP provides no recovery service.
  • Upon receipt of one or more TCP packets, the receiver returns an acknowledgement to the sender indicating that it received the packets.

Pregunta 57

Pregunta
What are TWO major benefits of adding a bridge to a network?
Respuesta
  • isolating potential network problems to specific segments
  • increasing the speed of a network
  • extending a LAN to cover greater distances by joining multiple segments
  • creating fewer collision domains.
  • forwarding data frames between LAN segments.

Pregunta 58

Pregunta
Indicates how well the network can accommodate more users or data transmission requirements.
Respuesta
  • Speed
  • Cost
  • Security
  • Availability
  • Scalability
  • Reliability
  • Topology

Pregunta 59

Pregunta
Which two statements about wireless networks are accurate?
Respuesta
  • Instead of cables, wireless communication uses RFs or infrared waves to transmit data.
  • To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
  • For wireless LANs, a key component is a router, which propagates signal distribution.
  • Wireless networks are not very common, and generally only large corporations use them.

Pregunta 60

Pregunta
What are TWO characteristics of OSPF?
Respuesta
  • hierarchical
  • proprietary
  • open standard
  • similar to RIP
Mostrar resumen completo Ocultar resumen completo

Similar

CCNA (200-120) / 60questões 60minutos / PT-BR
Almery M.
CCNA - MODELO OSI
Rafael La Selva
Roteadores - Memorias - Armazenamento
Fabiana Claro
Camada de Rede/Network
Fabiana Claro
Tabela de Roteamento
Fabiana Claro
Roteadores - Interfaces
Fabiana Claro
ACL - Lista de Controle de Acesso
Fabiana Claro
SYSLOG
Fabiana Claro
Palavras inglês CCNA
Igor Allen Ritzm