CCNA 3 (Version 7.00) ENSA Practice Final Exam Answers

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards

Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?

LLQ

2
New cards

Which QoS technique retains excess packets in a separate queue for later transmission?

shaping

3
New cards

What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?

traffic marking

4
New cards

What is a characteristic of the distribution layer in the three layer hierarchical model?

provides access to the rest of the network through switching, routing, and network access policies

5
New cards

Which two methods help to prevent the disruption of network services? (Choose two.)

- installing duplicate equipment to provide failover services

- using redundant connections to provide alternate physical paths

6
New cards

Which technology provides laptops the ability to function on a cellular network?

mobile hotspot

7
New cards

Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)

- broadband modem

- CSU/DSU

8
New cards

Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)

- amount of traffic

- security needs

= type of traffic

9
New cards

Which type of NAT maps a single inside local address to a single inside global address?

static

10
New cards
<p>Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?</p>

Refer to the exhibit. What has to be done in order to complete the static NAT configuration on R1?

Interface S0/0/0 should be configured with the command ip nat outside.

11
New cards
<p>Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?</p>

Refer to the exhibit. R1 is configured for static NAT. What IP address will Internet hosts use to reach PC1?

209.165.200.225

12
New cards

A network administrator is troubleshooting the dynamic NAT that is configured on router R2. Which command can the administrator use to see the total number of active NAT translations and the number of addresses that are allocated from the NAT pool?

R2# show ip nat statistics

13
New cards

What is correct in relation to NAT for IPv6?

It is a temporary mechanism to assist in the migration from IPv4 to IPv6.

14
New cards

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

- Filter unwanted traffic before it travels onto a low-bandwidth link.

- Place standard ACLs close to the destination IP address of the traffic..

- Place extended ACLs close to the source IP address of the traffic.

15
New cards
<p>Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.)</p>

Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.)

- R1 Gi0/1.12

- outbound

16
New cards

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

17
New cards

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

type 2

18
New cards

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​

- Layer 2

- Layer 3

19
New cards

What defines a two-tier spine-leaf topology?

The Cisco APICs and all other devices in the network physically attach to leaf switches.

20
New cards

Which SNMP message type informs the network management system (NMS) immediately of certain specified events?

Trap

21
New cards

Which number represents the most severe level of syslog logging?

0

22
New cards

Which command will backup the configuration that is stored in NVRAM to a TFTP server?

copy startup-config tftp

23
New cards

Which statement describes a feature of site-to-site VPNs?

Internal hosts send normal, unencapsulated packets.

24
New cards

Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?

clientless SSL

25
New cards

Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)

- clientless SSL VPN

- client-based IPsec VPN

26
New cards

When JSON data format is being used, what characters are used to hold objects?

double braces { }

27
New cards

Which two statements describe remote access VPNs? (Choose two.)

- Client software is usually required to be able to access the network.

- Remote access VPNs support the needs of telecommuters and mobile users.

28
New cards
<p>Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?</p>

Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?

Router R4 will become the DR and router R1 will become the BDR.

29
New cards
<p>Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. The routers are unable to form a neighbor adjacency. What should be done to fix the problem?</p>

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. The routers are unable to form a neighbor adjacency. What should be done to fix the problem?

Change the IP address on S0/0 of router R2 to 192.168.20.2.

30
New cards

What are the two purposes of an OSPF router ID? (Choose two.)

- to uniquely identify the router within the OSPF domain

- to facilitate router participation in the election of the designated router

31
New cards

Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?

show ip ospf interface serial 0/0/0

32
New cards
<p>Refer to the exhibit. What is the OSPF cost to reach the router A LAN 172.16.1.0/24 from B?</p>

Refer to the exhibit. What is the OSPF cost to reach the router A LAN 172.16.1.0/24 from B?

65

<p>65</p>
33
New cards
<p>Refer to the exhibit. Which data format is used to represent the data for network automation applications?</p>

Refer to the exhibit. Which data format is used to represent the data for network automation applications?

YAML

34
New cards

A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100 . Which part of the web link is called a fragment?

#page100

35
New cards
<p>Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?</p>

Refer to the exhibit. Why are routers R1 and R2 not able to establish an OSPF adjacency?

The serial interfaces are not in the same area.

36
New cards

A network technician has used the access-list 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?

The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.3.255

37
New cards

Which type of tool would an administrator use to capture packets that are going to and from a particular device?

protocol analyzer

38
New cards

A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?

Ask the user to issue the ipconfig command

39
New cards

Match the OSPF state with the order in which it occurs. (Not all options are used.)

knowt flashcard image
40
New cards

When an OSPF network is converged and no network topology change has been detected by a router, how often will LSU packets be sent to neighboring routers?

every 30 minutes

41
New cards

Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?

database description

42
New cards

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

building the topology table

43
New cards
<p>Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?</p>

Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?

The sequence of the ACEs is incorrect.

<p>The sequence of the ACEs is incorrect.</p>
44
New cards

A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?

to secure administrative access to the router

45
New cards
<p>Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?</p>

Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?

ACL 10 is removed from the running configuration.

46
New cards

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

47
New cards
<p>Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server.</p><p>Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)</p>

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server.

Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)

- access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq wwwaccess-list 105 deny ip any host 10.0.54.5access-list 105 permit ip any any

- R1(config)# interface gi0/0R1(config-if)# ip access-group 105 out

48
New cards

What is a feature of an IPS?

It can stop malicious packets.

49
New cards

Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?

virus

50
New cards

What is the significant characteristic of worm malware?

A worm can execute independently of the host system.

51
New cards

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code.

52
New cards

What is the function of ASICs in a multilayer switch?

They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.

53
New cards

What is the port density of a switch?

the number of available ports on a switch

54
New cards

What is a difference between the functions of Cloud computing and virtualization?

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

55
New cards

Why would a network administrator use the config-register 0x2102 command on a Cisco network device?

to ensure that the device loads the startup configuration file during startup

56
New cards
<p>Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)</p>

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)

- access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq wwwaccess-list 105 deny ip any host 10.0.54.5access-list 105 permit ip any any

- R1(config)# interface gi0/0R1(config-if)# ip access-group 105 out