Cisco CCNA Exam Questions

Page 3 of 25

41.

Which three of the following are data serialization languages? (Choose three.)

  • JSON

  • XML

  • YAML

  • HTML

  • Python

Data serialization languages are used to translate objects from complex data structures to a format that can be easily shared and transmitted. JSON, XML, and YAML are common ways to do this.

HTML is a mark-up language for displaying information in a browser. Python is a high-level, object-oriented programming language.

42.

An administrator wants to set a preferred route to a specific IP address. What should the subnet mask be for this situation? 

  • 255.255.255.255

  • 255.255.255.0

  • 1.1.1.1

  • 0.0.0.0

  • 255.255.255.1

Correct answer: 255.255.255.255

Using a subnet mask of 255.255.255.255 will set the preferred route to the specific address. This equates to a prefix length of /32.

43.

An administrator configures an interface to be an access port on a VLAN with an ID of 10. They want this interface to ignore DTP negotiations because it will only ever act as an access interface. What command should they run to specify this?

  • switchport mode access

  • switchport access vlan 10 

  • name 10

  • switchport trunk native vlan 10 

  • switchport trunk allowed vlan 10 

Correct answer: switchport mode access

The "switchport mode access" command tells the switch to always use the port as an access interface. That will prevent the Dynamic Trunking Protocol (DTP) from affecting it.

The "switchport access vlan 10" command sets an interface to vlan 10. The "name vlan-10" command sets the name of the VLAN to vlan-10. The "switchport trunk native vlan 10" command defines the native VLAN for a trunk port. The "switchport trunk allowed vlan 10" defines a list of allowed VLANs on a trunk.

44.

Which of the following is a VPN technology that can be used to create an unencrypted tunnel?

  • GRE

  • IPsec

  • HTTPS

  • RIP

  • LLQ

Correct answer: GRE

Generic Routing Encapsulation (GRE) creates a tunnel, which is a virtual link between routers. This can be used to forward unencrypted packets over the Internet, or used with IPsec to encrypt those packets.

Internet Protocol Security (IPsec) authenticates and encrypts packets. HTTPS is a protocol for securing communications between systems. Routing Information Protocol (RIP) is a hop-based routing protocol. Low-latency queuing (LLQ) is used for prioritizing traffic.

45.

Which two sentences are true about hop count as a routing metric? (Choose two.)

  • It prefers the path with the fewest hops.

  • It increments a hop each time a data packet passes through a router.

  • It considers the capacity of a link.

  • It chooses the most efficient route.

  • It is the default metric for OSPF.

Hop count is a basic metric used by RIP and RIPv2. It only picks the path with the fewest hops. A hop is defined as the pass of a data packet through a router. A bandwidth metric considers the capacity of a link. The hop count is not always the most efficient. OSPF uses cost as its metric.

46.

How big is the priority field in the STP/RSTP bridge ID?

  • 2 bytes

  • 6 bytes

  • 8 bytes

  • 1 byte

Correct answer: 2 bytes

The STP/RSTP bridge ID is 8 bytes long, with 6 bytes being the MAC address and 2 bytes being the priority field. 

47.

A Layer 2 switch receives a bad frame and discards it. Which of the following is the plane of the switch where this action occurred?

  • Data

  • Control

  • Management

  • NBI

  • SBI

Correct answer: Data

The data plane is where the device carries out actions to receive, process, and forward a message. It carries out the logic defined in the control plane.

The control plane configures how the data plane will act. The management plane provides a way to manage devices. The northbound interface (NBI) connects the control plane to the management plane. The southbound interface (SBI) connects the control plane with the data plane.

48.

Which sentence accurately compares controller-based networking and traditional networking?

  • Controller-based networking simplifies network function automation

  • Controller-based networking works on per-device management

  • Traditional networking is less susceptible to human-based errors

  • Controller-based networking extends project timelines

  • Traditional networking simplifies data analytics

Correct answer: Controller-based networking simplifies network function automation

Controller-based networking has many advantages over traditional networking. One major advantage is that controller-based networking makes it easier to automate network functions.

Traditional networking works on per-device management, is more susceptible to human-based errors, needs more time to complete projects, and makes data analytics more difficult.

49.

Two switches (SW1 and SW2) both have hosts on VLAN 10 and share a gigabit connection. However, their connection is not actively trunking. Which command on the gigabit interface on SW1 will start trunking between the switches?

  • switchport mode dynamic desirable

  • switchport mode dynamic auto

  • show interfaces trunk

  • vlan 10 

  • switchport nonegotiate

One of the switches should run the "switchport mode dynamic desirable" command, because both switches are currently in dynamic auto mode. When one switch is in dynamic desirable mode, it will change from passively waiting to actively initiating negotiations.

The "switchport mode dynamic auto" has each switch passively wait to receive trunk negotiation messages. The "show interfaces trunk" command lists information about only trunk interfaces. The "vlan 10" command creates a VLAN with an ID of 10. The "switchport nonegotiate" command disables the negotiation of trunking.

50.

What are two trunking protocols that have been supported by Cisco switches? (Choose two.)

  • IEEE 802.1Q

  • ISL

  • BGP

  • IGRP

Cisco switches have supported two trunking protocols over the years: IEEE 802.1Q and Inter-Switch Link (ISL). However, ISL is not supported in modern switches. 

Border Gateway Protocol (BGP) is used for exchanging router information. Interior Gateway Routing Protocol (IGRP) is used to communicate routing information.

51.

A switch has forwarded a frame to multiple different ports. This cannot be which of the following types of frames?

  • Known unicast frame

  • Unknown unicast frame

  • Broadcast frame

  • Multicast frame

Correct answer: Known unicast frame

If a frame has a destination address in the switch's MAC address table, then the frame is only forwarded to that port. 

An unknown unicast frame will be sent to all ports except the originating one because the switch does not know the destination port. Broadcast and multicast frames are sent to all other interfaces.

52.

Which two statements are true about anycast addresses? (Choose two.)

  • Two different routers can configure the same anycast address.

  • When a host wants to connect with an anycast address, they send a unicast message.

  • Anycast addresses only work in IPv4.

  • An anycast address is used to send a single packet to multiple devices

An anycast address can be configured on many different routers. Hosts will send a unicast message to the address, and a router will route it to the nearest anycast address. 

Anycast addresses only work with IPv6. A multicast address is used to send a single packet to multiple devices that subscribe to the address.

53.

In a spine-leaf network, how can an endpoint increase capacity and redundancy?

  • Connect to two or more leaf switches

  • Connect to two or more spine switches

  • Connect to one leaf switch and one spine switch

  • Connect to adjacent endpoints

  • Connect to a UCS server

Correct answer: Connect to two or more leaf switches

In a spine-leaf network, endpoints can only connect to leaf switches, and not spine switches or other endpoints like desktops or servers. By connecting to more than one leaf switch, an endpoint can achieve redundancy and increased capacity. 

54.

Which type of link is used to connect an autonomous AP that needs to support multiple VLANs to a switched LAN?

  • Trunk

  • Access

  • LAG

  • EtherChannel

Correct answer: Trunk

An autonomous access point maps a VLAN to a WLAN and BSS. VLANs will be brought to the AP via a trunk link.

An access link is used with a lightweight AP, because it uses CAPWAP tunnels. A link aggregation group (LAG) is used to bundle Ethernet connections. An EtherChannel aggregates multiple links into a logical link.

55.

What two things are true about running the "ip route 0.0.0.0 0.0.0.0 S0/1/0" command? (Choose two.)

  • It creates a gateway of last resort.

  • It creates a static default route.

  • It creates a floating static route.

  • It creates a static host route.

  • It creates a null route.

This is the format for creating a static default route, which is also referred to as a gateway of last resort.

A floating static route has an administrative distance assigned. A static host route goes directly to a single address. A null route prevents loops or DDoS attacks.

56.

Which command is used to configure a password for enable mode?

  • enable secret

  • password

  • login

  • line vty

Correct answer: enable secret

Using the "enable secret" command with a password value for its argument will configure a password for enable mode.

The "password" command sets the password for the console. The "login" command enables console password security. The "line vty" command enters vty configuration mode.

57.

Which command verifies the date and time on a device?

  • show clock

  • show ntp associations

  • show ntp status

  • ntp master

  • ntp server

Correct answer: show clock

The "show clock" command displays data and time information. It shows the time in a 24-hour format.

The "show ntp associations" command lists NTP servers that the device uses. The "show ntp status" command outputs NTP information. The "ntp master" command sets a device to act only as an NTP server and not a client. The "ntp server" command configures a device to act as both client and server. 

58.

Which of the following are text files used by Ansible? (Choose three.)

  • Playbooks

  • Inventory

  • Templates

  • Modules

  • State files

Ansible is a configuration management tool that uses several text files, including:

  • Playbooks: Describe the actions and logic that manage Ansible
  • Inventory: Lists the devices that Ansible manages and information about their roles, enabling Ansible to perform actions for various subsets
  • Templates: Describe the configuration of a device using variables, written in Jinja2
  • Variables: List variables that can be substituted into templates

Modules and state files are used by Terraform.

59.

Which two of the following are Layer 2 WLAN security types that can be configured through a WLC's GUI? (Choose two.)

  • WPA

  • 802.1x

  • IPsec

  • VPN Pass-Through

WPA and 802.1x are Layer 2 security types that can be configured on a wireless LAN controller's GUI.

IPsec and VPN Pass-Through are Layer 3 security types.

60.

When enabling OSPF with the "network" command, which wildcard mask compares only the first three octets?

  • 0.0.0.255

  • 0.255.255.255

  • 255.255.255.0

  • 255.0.0.0

  • 128.0.0.0

Correct answer: 0.0.0.255

The wildcard mask property of the "network" command lets a router only compare a subset of the octets for the given address. A value of 0 in the octet means that the router should check for a match, while a value of 255 means that the octet can be ignored for matching purposes.