Cisco CCNA Exam Questions

Page 4 of 25

61.

Which two protocols are for EtherChannel? (Choose two.)

  • PAGP

  • LACP

  • RSTP

  • CAPWAP

EtherChannel is used to combine ports into one logical port. Two protocols for EtherChannel are Port Aggregation Protocol (PAGP, which is proprietary to Cisco) and Link Aggregation Protocol (LACP, which is an open standard). Rapid Spanning Tree Protocol (RSTP) is used to route data without redundancy. Control and Provisioning of Wireless Access Points (CAPWAP) is used for centrally controlling wireless access points.

62.

In a two-tier LAN topology, which term describes the links between access switches and distribution switches?

  • Partial mesh

  • Star

  • Full mesh

  • Hybrid

  • Bus

Correct answer: Partial mesh

In a two-tier LAN design, a partial mesh of links is typically used between access and distribution switches. This provides a reasonable and cost-effective level of redundancy.

A star topology is represented in the links between a switch and end users. A full mesh topology has each node connected directly to every other node. A hybrid topology combines multiple topology types. A bus topology has each node connected to one cable.

63.

Which two of the following are advantages of the automation of networks? (Choose two.)

  • Improved efficiency

  • Reduced chances of human error

  • Reduced infrastructure footprint

  • Simplified network architecture

There are three core benefits of network automation: improved efficiency, reduced chances of human error, and lower operational expenses.

Automation doesn't necessarily reduce an organization's infrastructure footprint or simplify its network architecture.

64.

Which command is used to change the default time for a switch to remove entries in its MAC address table?

  • mac address-table aging-time

  • show mac address-table aging-time

  • clear mac address-table dynamic

  • show interface status

Correct answer: mac address-table aging-time

The correct command for changing the aging-time is "mac address-table aging-time." The aging time can be changed globally or per-VLAN.

The command show mac address-table aging-time will display the default aging time. The command clear mac address-table dynamic will remove dynamic entries from the MAC address table. The command show interface status shows line-by-line the status and operating information for each interface.

65.

Which of the following forms of AI is BEST defined by the ability to update its models continuously over time with access to new data?

  • Machine learning

  • Narrow AI

  • Generative AI

  • Predictive AI

Correct answer: Machine learning

Artificial intelligence describes when computers can learn and solve problems. Some important types of AI include:

  • Machine learning: Machine learning is a sub-field of AI focused on developing algorithms and models that are used to make predictions and decisions. ML is defined by being able to learn continuously with access to more data.
  • Narrow AI: Narrow AI is designed to achieve a particular purpose. For example, AI can be used for speech recognition or identifying signs of cyber threats in network traffic.
  • Generative AI: Generative AI tools are able to learn and make decisions based on facts and decisions. ChatGPT and similar large language models (LLMs) are examples of generative AI.
  • Predictive AI: Predictive AI is when a computer is able to learn relationships and patterns from different datasets, enabling them to make predictions on new data.

66.

An administrator starts OSPF with the "router OSFP 1" command. What does the number in this command represent?

  • Process ID

  • Router ID

  • Area

  • VLAN

  • Interface

Correct answer: Process ID

The number property in the "router OSFP 1" command is the process ID for OSFP. This ID is only used internally with the router.

The router ID is set with the "router-id" command. The area can be set with the "network" command. VLANs are created on switches. Interfaces are manipulated with various other commands.

67.

Which three of the following are advantages of using controller-based networking over traditional networking? (Choose three.)

  • Allows for configuration of the network rather than configuration per device

  • Allows for a dev-ops approach to networking

  • Allows for automation through northbound APIs

  • Enables granular, per-device configuration and management

  • Reduces dependence on automated processes for network management

Controller-based networking is a newer model of networking compared to traditional methods. It allows for configuring the entire network rather than configuring each device. It allows for a dev-ops approach, which makes it quick to test and deploy changes. It also allows for easier automation through northbound APIs.

Traditional networking focuses on configuring devices individually. Controller-based networks use automation to streamline network management.

68.

In a three-tier LAN design, what is the middle layer called?

  • Distribution

  • Access

  • Core

  • Collapsed core

Correct answer: Distribution

The middle layer in a three-tier LAN design in the distribution layer. It is an aggregation point for access switches and does not connect directly with end users.

The access layer is the first layer that connects directly with end users. The core layer connects distribution switches. A collapsed core is when the core and distribution layers are together.

69.

Under which sub-heading in a WLC's GUI can an administrator add the PSK for WPA2?

  • Authentication Key Management

  • Protected Management Frame

  • WPA2+WPA3 Parameters

  • Fast Transition

Correct answer: Authentication Key Management

In the Authentication Key Management, an administrator can select the pre-shared key's (PSK) format and set its value.

The Protected Management Frame (PMF) sub-heading enables or disables PMF. The WPA2+WPA3 Parameters sub-heading lets an administrator choose the encryption cipher. The Fast Transition sub-heading lets an administrator choose to use fast transitions between access points.

70.

What are three parameters that a WLC should configure when creating a WLAN? (Choose three.)

  • Wireless security type

  • Controller interface and VLAN number

  • SSID string

  • Virtual interface

Some of the parameters that need to be configured include the wireless security type, controller interface and VLAN number, and SSID string. These parameters can be configured through a WLC's web management platform.

A virtual interface is an IP address used with the WLC.

71.

A switch that has two broadcast domains can also be said to have what?

  • Two VLANs

  • No more than two collision domains

  • At least two trunks

  • Two subnets

Correct answer: Two VLANs

LANs and VLANs can be defined as broadcast domains. Any host that sends a broadcast frame will have that frame reach every other host in the VLAN.

A collision domain is created with each port on the switch, so there would be more than two. A trunk carries VLANs between switches. A subnet is a Layer 3 concept, while a VLAN is a Layer 2 concept.

72.

In the output of the "show ip route" command, which information comes after the term "via"?

  • Next-hop router

  • Prefix

  • Prefix length

  • Metric

  • Timer

Correct answer: Next-hop router

In the output of the "show ip route" command, the next-hop router comes after the words "via".

The prefix comes after the protocol code. The prefix length comes after the prefix. The metric comes after the administrative distance. The timer comes after the next-hop router.

73.

A user is authenticating to a system using their private key. Which of the following types of credentials is most likely to be involved in this process?

  • Certificate

  • Biometrics

  • Password

  • PIN

Correct answer: Certificate

A certificate uses the concepts of public keys and private keys to verify authenticity. They must be granted by a trusted certificate authority (CA) for validity.

Biometrics involves using physical traits like fingerprints. A password is a string of characters associated with a username. A PIN is a code to enter a system.

74.

Which three features are part of an STP cable? (Choose three.)

  • Twisted pairs

  • Foil shield

  • Braided shield

  • Core

  • Cladding

A shielded twister pair cable (STP) is used to protect from interference. It is composed of twisted pairs, a foil shield, a braided shield, and an outer jacket. A fiber cable uses a core and cladding.

75.

What is the subnet mask referred to by the prefix length of /24?

  • 255.255.255.0

  • 255.255.0.0

  • 255.0.0.0

  • 255.255.255.255

Correct answer: 255.255.255.0

With a prefix of /24, the 24 bits from the left of the address will be set to 1 to denote the network part of an address. This results in a mask of 255.255.255.0.

76.

When generating a unique interface ID using modified EUI-64, which bit is inverted in the last step?

  • 7th

  • 1st

  • 2nd

  • 6th

  • 8th

Correct answer: 7th

The 7th bit of the interface ID is inverted in the last step of generating a unique interface ID. Inverting the bit by hand involves converting the hexadecimal to binary for the conversion and then converting back again.

77.

An administrator wants to check the routing protocol parameters and current timer values. Which command gives this information?

  • show ip protocols

  • show ip route

  • show ip ospf

  • show ip ospf interface brief

Correct answer: show ip protocols

The "show ip protocols" command shows routing protocol parameters and the current timer values.

The "show ip route" command lists all IPv4 routes. The "show ip ospf" command gives information about the OSPF process running on the router. The "show ip ospf interface brief" command lists interfaces that have OSFP enabled.

78.

What type of interface or cable issue would likely occur due to electrical interference?

  • Errors

  • Duplex issues

  • Increased collisions

  • Speed mismatch

Correct answer: Errors

Electrical interference can lead to errors when sending and receiving packets. Each packet has a Frame Check Sequence (FCS) that is used to catch errors.

Duplex issues can occur when a full-duplex (switch) area of the network interacts with a half-duplex (hub) area.

Increased collisions occur if there are too many busy nodes on a network.

A speed mismatch can occur if there is older equipment on the network.

79.

Which three parameters can be used when removing dynamic entries from a MAC address table? (Choose three.)

  • VLAN

  • MAC address

  • Interface

  • IP address

When clearing entries from the MAC address table, it can be done by VLAN, interface, or MAC address. Clearing without parameters will remove all entries. Clearing entries is an enable-mode command.

80.

Which command creates a floating static route?

  • ip route 172.16.4.0 255.255.255.0 172.16.7.2 150

  • ip route 172.16.4.0 255.255.255.0 172.16.7.2

  • ip route 172.16.4.0 255.255.255.255 172.16.7.2

  • ip 172.16.4.0 255.255.255.0 172.16.7.2 140

Correct answer: ip route 172.16.4.0 255.255.255.0 172.16.7.2 150

A floating static route assigns an administrative distance to a route so that a static route is not always preferred over a dynamic route. The administrative distance is added as a parameter at the end of the "ip route" command.