CCNA R&S2(book) Posted byParisArau April 12, 2016 Leave a comment on CCNA R&S2(book) 1. Which of the following statements are true about the presentation layer in the OSI model?Sessions or dialogs between application are set upIt presents data to the application layer It converts coded data into a format the application layer can understandIt is responsible for data encryption, data decryption, and, finally, data compressionQuestion 1 of 50 2. What are the sublayers of the Data Link layer in the OSI model?MAC Link Control SublayerLogical Link Control SublayerMedia Access Control SublayerEthernet Access Control SublayerQuestion 2 of 50 3. What CDP debug command produces this output? debug cdp adjacencydebug cdp eventsdebug cdp packetsdebug cdp ipQuestion 3 of 50 4. What is the destination MAC address of an ARP Request packet?00:00:00:00:00:0001:05:0E:00:00:00The MAC address of the host whose IP address is being resolvedff:ff:ff:ff:ff:ffQuestion 4 of 50 5. When connecting to a Cisco device over the console port, what is the "bits per second" value that you need to set up in your terminal application?1024896004096Question 5 of 50 6. What command shows a brief summary of all interfaces?show ip brief interfacesshow brief ip interfacesshow ip brief interfacesshow ip interfaces briefQuestion 6 of 50 7. You execute the traceroute command and see the below output. How many hops away is the IP address to which the traceroute command was executed? 3210Question 7 of 50 8. You are shown this output. How many usable VLANs are there? 1348Question 8 of 50 9. Which statements about access ports are true?When a frame is received on an access link, it is tagged with its VLAN IDThe switch strips the tag of this frame at the destination before sending it on to the recipient hostAccess links are used to connect to hostsFrames sent across an access link are taggedQuestion 9 of 50 10. What is the size of the 802.1q tag?2 bytes4 bytes8 bytes1 byteQuestion 10 of 50 11. When will a trunk not be formed?When one side is "On" and the other side is "Auto"When both sides are "Desirable"When both sides are "Auto"When both sides are "On"Question 11 of 50 12. You see this log on a switch. What command was issued on SWITCH-2? *Mar 29 10:04:55.564: %CDP-4-NATIVE_VLAN_MISMATCH: Native VLAN mismatch discovered on GigabitEthernet1/0/2 (1), with SWITCH-2 GigabitEthernet1/0/2 (100).There was no change done on SWITCH-2 but was on the local device where the log is seenswitchport trunk 1 nativeswitchport trunk native vlan 1switchport trunk native vlan 100Question 12 of 50 13. Which of the following are the main methods to create interVLAN routing?Using physical router interfacesUsing a separate physical link for each VLANUsing subinterfacesUsing switched virtual interfacesQuestion 13 of 50 14. What is the correct configuration on the router for inter VLAN routing? ABCDQuestion 14 of 50 15. Which of the following are the steps to configure a subinterface on a router for inter VLAN routing?Create the switched virtual interface on the switchAssign an IP address to the subinterfaceSpecify the VLAN and the encapsulation protocol using the encapsulation [isl|dot1Q] [vlan] subinterface configuration commandCreate the subinterface using the interface [name].[subinterface number] commandQuestion 15 of 50 16. What command returns this output? show sdmshow sdm prefershow sdm accessshow sdm routingQuestion 16 of 50 17. Which of the following are some advantages of VTP version 3 over VTP version 1 or version 2?VTP primary server and VTP secondary servers (a VTP primary server updates the database information and sends updates that are honored by all devices in the system, while a VTP secondary server can only back up the updated VTP configurations received from the primary server to its NVRAM)Private VLAN supportThe option to turn VTP on or off on a per-trunk (per-port) basisEnhanced authenticationQuestion 17 of 50 18. Which switch relays VTP messages in this diagram? The switch in VTP Client modeThe switch in VTP Server modeThe switch in VTP Transparent modeThe switch in VTP Off modeQuestion 18 of 50 19. In which subnet is host 172.16.100.119/29?172.16.100.112/30172.16.100.116/30172.16.100.112/29172.16.100.118/29Question 19 of 50 20. What is the best summary route for the following routes: 172.16.30.0/24, 172.16.24.0/21, 172.16.27.0/22, 172.30.16.20.0/24?172.16.16.0/19172.16.16.0/20172.16.20.0/20172.16.0.0/18Question 20 of 50 21. What alternative IPv6 representations of 3FFF:1234:0000:0000:020C:0000:FEA7:F3A0 IPv6 address are valid?3FFF:1234::20C::FEA7:F3A03FFF:1234::020C:0000:FEA7:F3A03FFF:1234::20C:0000:FEA7:F3A03FFF:1234::20C:0:FEA7:F3A0Question 21 of 50 22. What is the prefix assigned to the link-local IPv6 addresses?FE80::/9FE80::/10FE80::/8FE8::/10Question 22 of 50 23. A PC has the following MAC address: 00.11.AA.BB.CC.DD. What is the EUI-64 address generated for this MAC?00.11.AA.FF.FE.BB.CC.DD02.11.AA.FF.FE.BB.CC.DD02.11.AA.FF.FF.BB.CC.DD00.11.AA.FF.FF.BB.CC.DDQuestion 23 of 50 24. What is the ISATAP identifier?00:00:5E:FE00:00:FE:FF00:00:FF:FF00:00:FE:5EQuestion 24 of 50 25. Which of the following are some of the Neighbor Discovery Protocol features?Next-hop discoveryNeighbor unreachabilityDuplicate Address DetectionRedirectQuestion 25 of 50 26. Traffic destined to 192.168.43.21 reaches the router, and the router has the following subnets in the routing table: 192.168.43.0/24, 192.168.32.0/20, 192.168.43.0/25, and 192.168.43.0/28. Which route will be used to forward the traffic?192.168.43.0/24192.168.32.0/20192.168.43.0/25192.168.43.0/28Question 26 of 50 27. What is the Administrative Distance of External EIGRP?90110120170Question 27 of 50 28. Which of the following statements about OSPF operation are true?Routers configured with OSPF send Hello packets out of all OSPF configured interfaces. If the router on the shared link agrees on certain values in the Hello packets, they become neighborsSome neighbors form adjacencies. This depends on the type of OSPF router and network, such as point-to-point or broadcastLink state advertisements are sent over every adjacency. These describe the router links, neighbors, and the link stateThe received LSA is stored in the router’s link state database, and a copy is sent to all neighborsQuestion 28 of 50 29. Which of the following are OSPF router types?Internal routerArea Border RouterBackbone routerAS Boundary RouterQuestion 29 of 50 30. Which of the following is not a state through which a DHCP client goes during IP assignment?InitializingDiscoveringRequestingRenewingQuestion 30 of 50 31. What command needs to be applied under a router interface whose IP address should be assigned through DHCP?ip dhcpip address dhcp enabledhcp addressip address dhcpQuestion 31 of 50 32. Which of the following are some of the steps involved in configuring DHCP server functionality on Cisco IOS?Assign a static IP on the LAN-facing interface you want to enable the DHCP service onCreate a DHCP poolDefine DHCP parameters within the DHCP poolDefine excluded DHCP addressesQuestion 32 of 50 33. Considering the diagram below, what needs to be configured and on which routers so that the client can be assigned an IP address through DHCP? ip helper-address 10.10.3.100 on R1ip helper-address 10.10.3.100 on R2ip helper-address 10.10.3.1 on R1ip helper-address 10.10.2.2 on R1Question 33 of 50 34. Which of the following ACL commands will allow EIGRP traffic?access-list 101 permit eigrp any anyaccess-list 101 permit 89 any anyaccess-list 101 permit 88 any anyaccess-list 101 permit igrp any anyQuestion 34 of 50 35. Which of the following are some of the most common NAT configuration errors?NAT inside and outside statements missing from the interfaceName calling the NAT pool doesn’t match the NAT pool name (case sensitive)ACL incorrectly configured to match wrong addresses or subnetsRouting is configured to reach the NAT pool addressesQuestion 35 of 50 36. You see the below output. What is the type of NAT configured? Static NATDynamic NATPort Address TranslationHost NATQuestion 36 of 50 37. Based on the below output, which statements are true? The root bridge ID is f4ac.c105.d200The root bridge ID is 0027.0c1a.db80The root port is GigabitEthernet1/0/2The priority is 32768Question 37 of 50 38. How long does it take for a port to transition from Learning state to Forwarding state based on the below output? 300 seconds2 seconds15 seconds20 secondsQuestion 38 of 50 39. Considering the below output, what will be the SWITCH-2 priority after the command "spanning-tree vlan 100 root primary" is configured on SWITCH-2? 829212388164844196Question 39 of 50 40. Based on the below diagram, what port will be in blocking state? Gi0/1Gi0/3Gi0/6Gi0/8Question 40 of 50 41. Based on the below diagram, which port will have the role of a root port? Gi0/1Gi0/3Gi0/6Gi0/8Question 41 of 50 42. What port role is defined by this phrase: "This elected port forwards data in the active topology"?Designated portRoot portAlternate portBackup portQuestion 42 of 50 43. You see the below output. Which statements are true? The bundle is SuspendedThe bundle is DownThe bundle is Layer 2 The bundle is Layer 3Question 43 of 50 44. Which OSPF state is described by "OSPF routers send LSR packets to request more recent instances of LSAs that have not been received during the Exchange state. The updates sent are placed in a link state retransmission link until acknowledgments are received. When OSPF routers receive LSRs, they respond with an LSU (link state update) containing the required information"?Exchange stateLoading stateExstart stateTwo-Way stateQuestion 44 of 50 45. Which LSA type provides information about destinations outside the local area?LSA Type 1LSA Type 3LSA Type 5LSA Type 7Question 45 of 50 46. You have the below output for route in the EIGRP topology table. To what value should the variance be set so that both next-hops will appear in the main routing table? 1234Question 46 of 50 47. Which FHRP allows you to use a physical IP address as a virtual IP address?OSPFVRRPHSRPSNRPQuestion 47 of 50 48. Which of the following are advanced security features that SNMPv3 provides but SNMPv2c or SNMPv1 does not?Authentication (using HMAC-SHA-2 Authentication Protocol)Message integrityEncryptionHash communityQuestion 48 of 50 49. Which of the following are the components of PPP?Point-to-Point Challenge ProtocolNetwork Control Protocol (NCP)Data Link ProtocolLink Control Protocol (LCP)Question 49 of 50 50. Which bit is marked on frames that have a lower importance than other frames?Drop Eligibility (DE)Discard Eligibility (DE)Do-not-forward Eligibility (DE)Drop Explicit (DE)Question 50 of 50 Loading...