Practice Exam 2

Are you ready to assess your preparedness for the CCNA 200-301 exam? Practice Exam 1 and Practice Exam 2 are here to help.

As you take this practice exam, consider the following test-taking tips:

  • Watch your time in the simulations: Just like the real exam, this practice exam includes simulations. You access these simulations from the companion website. Download these files before starting your exam. When you encounter one in this practice exam, launch the exercise and complete it, making sure to be careful about how much time you spend in the exercise—just as you would in the real exam.

  • Read each question twice if necessary: Be sure to read each question carefully so that you fully understand it. You may need to read some questions twice.

  • Read the answers starting from the bottom: When you read the answers from the bottom, you force yourself to carefully read each answer. If you read the answers from the top, you might find yourself quickly selecting an answer that looks right and skipping over the other answers. This is dangerous as there might be a better answer later in the options.

  • Time yourself: The CCNA 200-301 exam is a 90-minute exam. Time yourself during this practice exam to make sure that you stay within this time limit.

  • If you do not know the answer to a question, make a note of it: Go back and review any trouble areas later. Be sure that you are mastering each topic area, not just looking up the answers to individual questions. If you are unsure about one aspect of a topic, chances are you might be unsure about other areas related to that same topic.

  • Prepare mentally to take a test: To properly assess yourself, take this practice exam as you would take the real exam. This means that you should find a quiet place without any distractions so that you can focus on each question. Equip yourself with scratch paper and a pen and pencil. For the actual exam, you will be allowed no other tools (such as calculators), so you shouldn’t use additional tools for the practice exams either.

  • If you cannot determine the correct answer(s), begin by eliminating incorrect answer(s): If there are four options, and you know that three are absolutely wrong, the fourth option has to be the correct one.

  • Consider taking this practice exam, as well as the next one, multiple times until you get perfect scores: Consistently scoring high on these practice exams is a good indication that you’re ready to take the actual exam.

  • Pay close attention to the Answer Key: The answers to the practice exam questions include explanations, which often bring up related important information. Even if you answered a question correctly, be sure to read the explanation in the Answer Key.

  • Use the online materials: There are even more practice exams waiting for you on the Pearson Test Prep software that is available to you either online or as an offline Windows application. Be sure to use those materials as well.

  • Don’t despair: Do not be overly upset if on your first attempt at this practice exam, you do not score well. It only means that you need to continue studying. Be glad that you can spot your weak areas now and not after getting into the actual exam. Go back through and review your problem areas now to ensure that you are ready!

Congratulations on your pursuit of this valued IT certification!

1. Examine the following NAT configuration. What is the problem with this configuration?

interface gi0/0
 ip address 10.10.10.1 255.255.255.0
 ip nat inside
!
interface gi0/1
 ip address 10.10.20.1 255.255.255.0
 ip nat inside
!
interface serial 0/0
 ip address 172.16.10.64 255.255.255.0
!
ip nat pool MYPOOL 172.16.10.1 172.16.10.1 prefix 24
ip nat inside source list 7 pool MYPOOL overload
access-list 7 permit 10.10.10.0 0.0.0.31
access-list 7 permit 10.10.20.0 0.0.0.31

_________

2. Which wireless security protocol makes the use of CCMP mandatory?

Image A. DAI

Image B. IPsec

Image C. WPA2

Image D. WEP

3. The user at the PC shown in the figure is copying a file from the server by using a program that uses a connectionless transport protocol. Which protocols on the left match up to the layers on the right regarding the encapsulation done by the PC? (Note that not all the protocols are used.)

images

4. What declarative language is shown in this example?

user { 'asequeira':
  ensure => present,
  uid    => '1453',
  shell  => '/bin/bash',
  home   => '/var/tmp'
}

Image A. Puppet

Image B. Ruby

Image C. Python

Image D. C#

5. How are the connections made between devices in the spine-leaf architecture of Cisco ACI?

Image A. Each leaf device connects to every other leaf device.

Image B. Each spine device connects to every other spine device.

Image C. Exactly one spine device connects to exactly one leaf device.

Image D. Each leaf device connects to every spine device.

6. Examine the configuration shown here. Why is this configuration producing an error when pasted into the CLI?

Current configuration : 2945 bytes
!
...
hostname Router-A
!
...
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
media-type rj45
!
interface GigabitEthernet0/1
ip address 172.16.1.64 255.255.255.224
duplex auto
speed auto
media-type rj45
!
ip forward-protocol nd
!
!
no ip http server
no ip http secure-server
ip route 10.10.10.0 255.255.255.0 172.16.1.2
!
!
!
access-list 101 permit ip 10.10.0.0 0.0.255.255 any
access-list 101 deny ip host 10.10.10.1 any
access-list 101 deny ip any any log
!
...
!
end

Image A. There is no enable password set.

Image B. The hostname is not legal.

Image C. The hostname contains an invalid character.

Image D. There is a bad IP address and mask combination.

Image E. The second entry of ACL 101 will in effect not deny anything more than the next ACE.

7.What information for a wireless network can you choose not to broadcast?

Image A. SSID

Image B. The AP’s MAC address

Image C. Type

Image D. Version

8. What QoS technology is often used for congestion management in VoIP environments?

Image A. LLQ

Image B. CBWFQ

Image C. WFQ

Image D. FIFO

9. What is smaller and more efficient than a virtual machine (VM)?

Image A. Bucket

Image B. Cluster node

Image C. API

Image D. Container

10. What is true regarding a network device that receives the packet shown in the protocol analyzer output that follows? (Choose two.)

images

Image A. A bridge would forward the packet based on the Layer 1 destination address.

Image B. A hub would forward the packet based on the Layer 2 destination address.

Image C. A switch would forward the frame based on the Layer 2 destination address.

Image D. A router would forward the packet based on the Layer 2 source address.

Image E. A router would forward the packet based on the Layer 3 source address.

Image F. A router would forward the packet based on the Layer 3 destination address.

11. Which RSTP port role functions to provide a fast converging replacement for the current root port?

Image A. Disabled

Image B. Alternate

Image C. Backup

Image D. Designated

12. Map the layers on the left to the protocols on the right. Note that not all layers are used, and some layers may be used more than once.

images

13. What Cisco wireless controller feature simplifies controller configuration by no longer requiring the setup of primary and secondary ports for each interface?

Image A. RSTP

Image B. SNMP

Image C. VTP

Image D. LAG

14. What transport layer protocol provides sequencing and synchronization?

Image A. HTTP

Image B. TCP

Image C. ICMP

Image D. UDP

15. What device protects “internal” networks from “external” networks?

Image A. WLC

Image B. Firewall

Image C. AP

Image D. Layer 2 switch

16. What layer of the classic Cisco network model is typically not collapsed in a simplified two-layer design?

Image A. Access

Image B. Internet

Image C. Core

Image D. Distribution

17. You are examining the interfaces on a Cisco WLAN controller. You observe an interface named Students-VLAN. What is most likely the type of this interface?

Image A. Service port interface

Image B. User-defined dynamic interface

Image C. Management interface

Image D. AP-Manager interface

18. What is the standard maximum frame size in a typical Ethernet network (in bytes)?

Image A. 1500

Image B. 1600

Image C. 1900

Image D. 9000

19. In the network depicted, the user at PC1 has asked which program to use to copy a file from the server to PC1 using a reliable Layer 4 transport protocol. Which of the following would meet both requirements? (Choose two.)

images

Image A. OSPF

Image B. TFTP

Image C. FTP

Image D. SCP

Image E. DNS

20. Which statement about PortFast on Cisco switches is incorrect?

Image A. PortFast is used exclusively on trunk ports.

Image B. PortFast speeds convergence.

Image C. PortFast is supported in STP and RSTP.

Image D. PortFast is designed for use on edge ports.

21. What technology is used to allow a switch port to carry the traffic of multiple data VLANs from one device to another in a Cisco network?

Image A. VLAN hopping

Image B. Trunking

Image C. Port security

Image D. VTP

22. Examine the following MAC addresses on two switches:

SwitchA: c001.3412.9301

SwitchB: 0019.e728.8101

In a tiny network with only these two switches, which switch becomes the root bridge if the default STP priority values are in place?

Image A. SwitchA

Image B. SwitchB

Image C. Neither of these switches

Image D. Both devices

23. What port security approach is considered a mix of dynamic and static configuration?

Image A. Trunking

Image B. Violation null

Image C. Sticky learning

Image D. Blocked learning

24. Your junior administrator is examining the routing table on a Cisco router and asks you what is the meaning of the D she sees in routing table entries. What does this indicate?

Image A. OSPF

Image B. BGP

Image C. RIP

Image D. EIGRP

25. What prefix is reserved for IPv6 link-local addresses?

Image A. fe80::/10

Image B. fec0::/10

Image C. fe80::/8

Image D. fec0::/8

26. Examine the command shown here. What is the purpose of the last argument in this command (121)?

ip route 10.10.10.0 255.255.255.0 172.16.1.1 121

Image A. This is a sequence number.

Image B. This is the metric value for the route entry.

Image C. This is an administrative distance value to create a floating static route.

Image D. This is a weight value.

27. Which of the following is used by an IPv6 multicast address?

Image A. f080::/10

Image B. ff00::/8

Image C. fc00::/8

Image D. f008::/10

28. What networking device provides instructions to APs?

Image A. Router

Image B. Firewall

Image C. Switch

Image D. WLC

29. Which of the following does not need to match when configuring OSPF version 2 peering?

Image A. The local process ID

Image B. The hello and dead timers

Image C. The area ID

Image D. Authentication

30. What type of modern computer threat involves the use of zombies or botnets?

Image A. Reconnaissance

Image B. Man-in-the-middle attack

Image C. DDoS attack

Image D. Trojan horse

31. In the network depicted, the server is sending HTTP content back to the PC that requested it. Which of the following is true as the packets are forwarded over the network?

images

Image A. The bridges and switches use Ethernet addresses to make forwarding decisions.

Image B. The hubs, bridges, and switches use Ethernet addresses to make forwarding decisions.

Image C. The routers, bridges, and switches use Ethernet addresses to make forwarding decisions.

Image D. The hubs, routers, bridges, and switches use Ethernet addresses to make forwarding decisions.

32. Based on the network depicted, provide the complete syntax for a standard ACL for Router 2 G2/0 that permits traffic sourced from the PC but denies all other traffic. This ACL must use the number 10 and must use the most efficient syntax possible.

_________

images

33. After identification has been accomplished with a DDoS attack, what is typically the next step in mitigation?

Image A. Forwarding

Image B. Filtering

Image C. Monitoring

Image D. Redirection

34. Which of the following is essentially a standards-based version of HSRP?

Image A. OSPF

Image B. SNMP

Image C. VRRP

Image D. GLBP

35. Examine the topology shown. Given that the IP address assigned to R2 fa1/0 is 10.2.2.2, provide a default static route on R1 that uses R2 as the default gateway.

_________

images

36. Your junior admin notes that when he just performed a ping, one of the packets failed. What is the most likely cause of the following results?

Router1# ping 10.255.0.126
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.255.0.126, timeout is   2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max =   35/72/76 ms

Image A. Load balancing, with one of the next hops being unavailable

Image B. ARP resolution

Image C. Half-duplex operation

Image D. 10 Mbps being used instead of Fast Ethernet or Gigabit Ethernet

37. Router A is assigning IP addresses to hosts in VLAN 10, as shown in the network depiction. The user powers up PC-10 and checks https://www.reuters.com/ for news. What are the first four protocols used by PC-10 when it powers up, in order?

images

_________

38. Given the following address and mask 172.16.10.1 255.255.248.0, what is the broadcast address for the subnet?

Image A. 172.16.15.255

Image B. 172.16.8.0

Image C. 172.16.16.255

Image D. 172.16.255.255

Image E. 172.16.10.255

39. What is the authentication method used in many RADIUS environments today?

Image A. EAP

Image B. PAP

Image C. Telnet

Image D. MD5

40. What is the term for an API that communicates from a network management station to the SDN controller?

Image A. West

Image B. East

Image C. Southbound

Image D. Northbound

41. What is the purpose of the command service timestamps log datetime msec?

Image A. To prevent attackers from manipulating the time in syslog messages

Image B. Not applicable as this command is not valid

Image C. To mark syslog messages with the data and time, including the milliseconds

Image D. To indicate the time of transference for syslog messages to the server

42. What command does a client use to enable stateless autoconfiguration of IPv6 address information on an interface?

Image A. ipv6 address autoconfig

Image B. ipv6 address dhcp

Image C. ipv6 address enable

Image D. ipv6 enable

43. OSPF is properly configured and working on both routers shown in the depicted network. The following is added to Router X: ip route 10.255.0.128 255.255.255.224 10.255.0.75 89. What will be the result?

images

Image A. The static route will have an administrative distance that is better than that of OSPF.

Image B. There will be a Layer 2 loop.

Image C. Router X will attempt to send to PC 1 packets destined to subnet 10.255.0.128/27.

Image D. A broadcast storm will occur.

44. Examine the topology shown here. PC1 is sending an HTTP packet to Server 1. What is true about this traffic as it is forwarded through Switch C? (Choose three.)

images

Image A. The source physical address will be 0000.3333.3333.

Image B. The source Layer 2 address will be 00:00:11:11:11:11.

Image C. The source address will be 10.255.0.92.

Image D. The destination physical address will be 00:00:66:66:66:66.

Image E. The destination address will be 0000.4444.4444.

45. As shown in the switch MAC address table below the topology depicted, PC 1’s ARP cache is empty, and the user at PC 1 uses ping to test the IP address reachability of Server 1. Which of the following is true when the user presses Enter?

images

MAC Address

VLAN

Port

0000.1111.1111

1

0/8

0000.2222.2222

1

0/7

0000.6783.BEEF

1

0/6

Image A. The first frame will be sent out port 0/6 only.

Image B. The switch will add the printer’s MAC address to the MAC address table.

Image C. The first frame from PC1 will be forwarded out all ports except 0/7.

Image D. The reply to the ping request will cause the server’s MAC address to be added to the table.

Image E. The first frame will use Server 1’s MAC address as the destination MAC address.

46. A host runs the command ipconfig on the local system. The output is as follows:

Ethernet adapter:
 Connection-specific DNS Suffix . :
 IPv4 Address. . . . . . . . . . . : 172.18.62.255
 Subnet Mask . . . . . . . . . . . : 255.255.248.0
 Default Gateway . . . . . . . . . : 172.18.63.254
 Which of the following are true? (Choose two.)

Image A. The broadcast address for the host’s subnet is 172.18.71.255.

Image B. The host is attached to a subnet of a Class B private network.

Image C. The subnet the host is connected to can support up to 2048 hosts.

Image D. The host with IP address 172.18.64.5 would be on the same network as the host in the question.

Image E. The host address is on the 172.18.56.0/21 network.

47. Which of the following are valid host addresses when using the mask 255.255.248.0? (Choose three.)

Image A. 34.45.56.0

Image B. 40.50.60.0

Image C. 50.60.70.255

Image D. 51.61.71.255

Image E. 60.70.80.0

Image F. 60.70.80.255

48. Refer to the depicted network. All the switches and R1 have had their startup configurations deleted and then were rebooted before saving to NVRAM. These devices are now running in their default configuration. Which of the following are true? (Choose three.)

images

Image A. Clients shown in the diagram as being on VLANs 10, 20, and 30 will now all be on the same VLAN.

Image B. SW1 will see CDP neighbors on at least three interfaces.

Image C. The commands show protocols, show ip interface, show interface, or show ip interface brief can be used to confirm that R1 G0/0 is up/up.

Image D. If the command ip address 10.0.0.1 /24 were added for G0/0 on R1, SW1 would learn that IP address within 60 seconds.

Image E. SW2 will see two CDP neighbors.

49. Provide the switch configuration to meet these requirements:

Image The user account BOB should be created with the password ToUgH1!23, which is stored using MD5.

Image Telnet should be disabled on the switch.

Image SSHv2 should be enabled on the switch.

Image The local user accounts should be used to authenticate on the vty lines.

Image Existing and future plaintext passwords should be encrypted.

Image The password to get into privileged mode should be iTsMe@HeRe$, and it should be stored using MD5.

Image The management interface should use the default VLAN and have the IP address 10.20.30.75/27.

Image The default gateway should be set to 10.20.30.94.

_________

50. CSMA/CD technology is critical for what type of Ethernet network?

Image A. Full mesh

Image B. Partial mesh

Image C. Star

Image D. Half-duplex

51. HANDS-ON SIMULATION QUESTION 3

52. How is CDP carried on the network?

Image A. Using 802.1Q messages

Image B. Using VTP messages

Image C. Using Layer 2

Image D. Using Layer 1

53. What is the default administrative distance of iBGP?

Image A. 20

Image B. 90

Image C. 120

Image D. 200

54. What two options exist for the next-hop information in a static route? (Choose two.)

Image A. Specifying the next-hop IP address

Image B. Specifying the next-hop MAC address

Image C. Specifying the next-hop CDP ID

Image D. Specifying the exit interface

55. What is the default lease duration for a Cisco DHCP server?

Image A. One hour

Image B. One day

Image C. One week

Image D. One month

56. How do you configure a Cisco router to use its internal clock as the reference time source and then become an NTP server?

Image A. Use the ntp server command.

Image B. Use the ntp master command.

Image C. Use the ntp source command.

Image D. Use the ntp clock command.

57. What is the default privilege level for a local user account created with the username command?

Image A. 0

Image B. 1

Image C. 8

Image D. 15

58. What vty line command causes the local username database to be checked for remote access?

Image A. login

Image B. local

Image C. login local

Image D. aaa login local

59. HANDS-ON SIMULATION QUESTION 4

60. What component does Ansible use to gather plays that perform tasks on a network?

Image A. Playbook

Image B. Inventory

Image C. Cookbook

Image D. Runbook

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.216.163