Cisco CCNA Exam Questions

Page 1 of 25

1.

How does a switch prevent flooded frames from looping indefinitely?

  • STP

  • VLANs

  • OSPF

  • RIPv2

Correct answer: STP

The Spanning Tree Protocol (STP) is used to prevent looping of flooded frames. It makes sure that there is only one active path between any pair of LAN segments.

VLANs break a physical network into multiple logically segmented networks. A MAC address table is used by a switch to keep track of which devices are on which ports. Open shortest path first (OSPF) is a routing protocol to calculate the best routes to subnets. Routing Information Protocol v2 (RIPv2) is a routing protocol that uses hop count as a metric.

2.

An organization wants to use a Cisco-proprietary AAA server with their users. Which protocol should they use?

  • TACACS+

  • RADIUS

  • LDAP

  • DIAMETER

Correct answer: TACACS+

TACACS+ is a Cisco proprietary AAA protocol. It has a client/server model where an authenticating client device talks to a AAA server.

RADIUS and LDAP are standards-based protocols. DIAMETER evolved from RADIUS.

3.

When using an AP to support multiple SSIDs, which three aspects of the AP remain the same for each BSS? (Choose three.)

  • Channel

  • BSA

  • Transmitter

  • Password

  • SSID

A single access point (AP) can have multiple VLANs mapped to multiple SSIDs. When doing this, all basic service sets (BSSs) of the AP use the same channel, cover the same geographic area of the basic service area (BSA), and utilize the same hardware, such as the receiver, transmitter, and antenna. 

Each BSS will have its own SSID and password for users to connect to, and the BSSID will be unique, with each one having its last digit incremented.

4.

Which wireless authentication method was defined in the original 802.11 standard?

  • WEP

  • WPA

  • EAP

  • LEAP

  • WPA2

Correct answer: WEP

Only open authentication and the Wired Equivalency Protocol (WEP) were specified in the original 802.11 standard. It has several weaknesses and has since been deprecated.

Wi-Fi Protected Access (WPA) was created to improve WEP. The Extensible Authentication Protocol (EAP) defines methods that other protocols can use. Lightweight EAP (LEAP) was developed after WEP. WPA2 was developed after WPA.

5.

Which statement is true about TCP?

  • It has error-recovery features.

  • It is used for multicast network transmissions.

  • It is used for broadcast network transmissions.

  • It requires a two-way handshake.

Correct answer: It has error-recovery features.

TCP is used for reliable connections, so it has error-checking features in case packets are not delivered. 

UDP is used for multicast and broadcast network transmissions. TCP uses a three-way handshake rather than a two-way handshake.

6.

Which statement is true of an Ethernet point-to-point network?

  • Each link works independently of other links.

  • It only uses CSMA/CD.

  • It is half duplex.

  • It does not allow a device to send and receive at the same time.

Correct answer: Each link works independently of other links.

An Ethernet point-to-point network describes a network that uses switches so that each point-to-point connection is independent. This is in contrast to an Ethernet shared media network, which uses hubs and shares bandwidth amongst connected nodes.

7.

Which type of IPv6 address is used with the Neighbor Discovery Protocol?

  • Link local

  • Unique local

  • Global unicast

  • Multicast

Correct answer: Link local

Link local addresses are used for automated functions like Stateless Auto-Configuration and Neighbor Discovery Protocol. The Neighbor Discovery Protocol has functionality similar to ICMP and ARP in IPv4. 

A unique local address is an address within a site that is not for routing on the Internet. A global unicast address is a public address that is routable on the IPv6 Internet. A multicast address is a method for transmitting data to a group of interfaces.

8.

Which of the following commands creates a static host route to an address?

  • ip route 10.0.0.12 255.255.255.255 172.16.0.4

  • ip route 10.0.0.12 0.0.0.0 172.16.0.4

  • ip route 0.0.0.0 0.0.0.0 172.16.0.4

  • ip route 10.0.0.12 255.255.255.0 172.16.0.4

  • ip route 10.0.0.12 255.255.0.0 172.16.0.4

Correct answer: ip route 10.0.0.12 255.255.255.255 172.16.0.4

A static host route is a route to a single address. In order to create a static host route, use the IP address plus subnet mask of 255.255.255.255.

The other answer choices use the wrong subnet mask value.

9.

An administrator wants to make FTP transfers of IOS files without having to supply authentication details each time. What are two commands they can run to accomplish this?

  • ip ftp username

  • ip ftp password

  • copy ftp flash

  • copy tftp flash

The "ip ftp username" and "ip ftp password" commands store FTP usernames and passwords, respectively.

The "copy ftp flash" command copies an IOS image to flash memory with FTP. The "copy tftp flash" command copies an IOS image to memory with TFTP. 

10.

What does a controller use to communicate with network devices?

  • Southbound interface

  • Northbound interface

  • Westbound interface

  • Eastbound interface

Correct answer: Southbound interface

In software-defined networking, the southbound interface (SBI) connects from the controller to network devices. It is called southbound because it appears below the controller in network drawings.

The northbound interface connects the controller to the applications that enable network programmability. Westbound and eastbound interfaces are not accepted terminologies.

11.

An administrator runs the "show ip route" command and sees a line with "I 10.0.0.0/8 [100/1600] via 172.16.1.200, 00:00:01, Ethernet0" in the output. In this output, what is the value for the next-hop router?

  • 172.16.1.200

  • 10.0.0.0

  • /8

  • Ethernet0

  • 00:00:01

Correct answer: 172.16.1.200

The next-hop router comes after the prefix, mask, administrative distance, and metric. This is the IP address where a matching packet is sent to.

The prefix is 10.0.0.0. The prefix length (mask) is /8. The interface is Ethernet0. The timer is 00:00:01.

12.

What is the function of SNMP in a network?

  • To manage and monitor network devices

  • To send and receive email

  • To securely transfer files remotely

  • To enable hosts to create secure communication channels

Correct answer: To manage and monitor network devices

The role of the Simple Network Management Protocol is to manage and monitor network devices. It is a connection-less protocol that uses UDP packets.

SMTP is used to send and receive email. SFTP is used to securely transfer files remotely. SSH is used to enable hosts to create secure communication channels.

13.

What are two components of a URI? (Choose two.)

  • Path

  • Query

  • MAC address

  • Interface

A Uniform Resource Identifier (URI) is used to request resources over the internet. It has four parts: the protocol, address, path, and query.

MAC addresses and interfaces are not parts of a URI. 

14.

Which three situations are addressed by using RSTP? (Choose three.)

  • Broadcast storms

  • MAC table instability

  • Multiple frame transmission

  • DR/BDR elections

  • Private to public IP addresses mapping

Rapid Spanning Tree Protocol (RSTP) is used to stop looping. It can prevent broadcast storms (forwarding a frame repeatedly on the same link), MAC table instability (constant updating of the MAC address table from loops), and multiple frame transmission (multiple copies of a frame reaching a host). Designated Router / Backup Designated Router is related to routing and Open Shortest Path First (OSPF). Mapping private to public IP address is related to Network Address Translation (NAT).

15.

A Layer 2 switch has two VLANs: VLAN 10 and VLAN 20. In order to send a packet from VLAN 10 to VLAN 20, what device is needed?

  • Router

  • Hub

  • Bridge

  • Repeater

Correct answer: Router

If a switch only operates at Layer 2, it will need a router to route packets between different VLANs on it. The router will have a physical interface in each VLAN.

A hub does not do routing. A bridge creates a single network from multiple segments. A repeater amplifies a signal.

16.

Which type of Ansible file provides logic and actions about what Ansible should do?

  • Playbooks

  • Inventory

  • Templates

  • Variables

Correct answer: Playbooks

Playbooks tell Ansible what to do. This includes configuring devices and pushing out the changes.

Inventory files contain device names and their information. Templates have device configurations with variables. Variables files list variables that Ansible will substitute in the templates. 

17.

Which layer of the OSI model are TCP and UDP?

  • Transport

  • Physical

  • Network

  • Data Link

  • Application

Correct answer: Transport

TCP and UDP are protocols in the transport layer. TCP is for creating connections while UDP is for connectionless communication. 

The physical layer includes hardware like cables and interface cards. The network layer includes protocols like IP and ICMP. The data link layer includes Ehternet and PPP.  The application layer includes protocols like HTTP and SMTP.

18.

Which two sentences correctly describe router IDs in OSPF? (Choose two.)

  • A router with a higher router ID wins an election if there is a tie with interface priority

  • The router ID can be configured with the "router-id" command

  • Router IDs have no impact on the DR/BDR election process

  • A router ID is configured with the "ip ospf priority" command

The router ID is a factor in determining the designated router and backup designated router (DR/BDR) in OSPF. If there is a tie with interface priorities, then the router with the highest router ID wins. The router ID can be configured with the "router-id" command.

The router ID is a factor in determining the winner of a DR/BDR election if there is a tie comparing interface priorities. Router IDs can have an impact on the DR/BDR election process. The OSPF priority is configured with the "ip ospf priority" command.

19.

Which command will create a static default route?

  • ip route 0.0.0.0 0.0.0.0 S0/1/0

  • ip route 10.0.0.4 255.255.255.255 10.3.4.5

  • ip route 10.0.4.0 255.255.255.0 10.0.5.2 125

  • ip route 172.12.3.0 255.255.255.0 S0/1/0

  • ipv6 route 2020:ef45:2222:4::21/128 2020:ef45:2222:5::3

Correct answer: ip route 0.0.0.0 0.0.0.0 S0/1/0

A static default route will have subnet and mask values of 0.0.0.0.

The command "ip route 10.0.0.4 255.255.255.255 10.3.4.5" will create a static host route. The command "ip route 10.0.4.0 255.255.255.0 10.0.5.2 125" will create a floating static route. The command "ip route 172.12.3.0 255.255.255.0 S0/1/0" will create a static network route. The command "ipv6 route 2020:ef45:2222:4::21/128 2020:ef45:2222:5::3" will create a host route in IPv6.

20.

Which two of the following are considered networking protocols for network safety? (Choose two.)

  • HTTPS

  • SFTP

  • SNMP

  • ICMP

Protocols that deal with network safety are used for keeping information secure. SFTP is for sending files encrypted over the network. HTTPS is for sending encrypted data between a client and a web server.

SNMP is a network management protocol. ICMP is used to diagnose networking issues.