Cisco CCNA Exam Questions

Page 8 of 25

141.

Which three of the following are attributes of RESTful APIs? (Choose three.)

  • Client-server architecture

  • Stateless operation

  • Uniform interface

  • Server-side data storage

  • Mandatory caching

A RESTful API has six well-defined attributes. These attributes are client/server architecture, stateless operation, caching, uniform interface, layered, and code-on-command.

They are stateless, so they don't store data on the server. RESTful APIs require resources to be marked as cacheable or not but don't have mandatory caching.

142.

How large is the system ID extension in the Priority field of a switch's BID?

  • 12 bits

  • 4 bits

  • 2 bytes

  • 6 bytes

Correct answer: 12 bits

The system ID extension represents a VLAN ID. It is preceded by a 4-bit Priority sub-field and is used to support multiple spanning trees. These combine to form the 2-byte priority field, which is followed by a 6-byte System ID (MAC address).

143.

Which command is used to verify that two routers are OSPF neighbors?

  • show ip ospf neighbor

  • ospf show neighbor

  • show ospf neighbor

  • show ospf neighbors

Correct answer: show ip ospf neighbor

The "show is ospf neighbor" command displays a router's OSPF neighbors.

The other answer choices are not the correct syntax.

144.

When configuring a WLAN's Layer 2 authentication with a WLC's GUI, which option represents open authentication?

  • None

  • WPA+WPA2

  • Static WEP

  • CKIP

  • 802.1x

Correct answer: None

Selecting "None" from the dropdown will use open authentication. Open authentication does not need a key or any credentials.

WPA+WPA2 will use WPA2 because it is more secure. Static WEP uses a WEP security key. CKIP uses the Cisco Key Integrity Protocol. Option 802.1x uses EAP authentication with dynamic WEP.

145.

Which of the following shows the format for a JSON key/pair?

  • "fruits": ["apples", "oranges", "bananas"]

  • "fruits": ("apples", "oranges", "bananas")

  • "fruits": [apples, oranges, bananas]

  • fruits -> ["apples", "oranges", "bananas"]

  • $fruits -> ["apples", "oranges", "bananas"]

JSON is used for automation and programmability. The format for creating a JSON key/value pair is to have the key and values in double quotes and separated by a colon. If the value is an array, the list items are enclosed in square brackets.

146.

Which two of the following are control plane protocols? (Choose two.)

  • OSPF

  • ARP

  • SSH 

  • Telnet

The control plane refers to actions that control the data plane. Many of these actions involve managing tables such as routing tables, MAC tables, or RP tables. Open Shortest Path First (OSPF) is a routing protocol. Address Resolution Protocol (ARP) is a protocol that matches IP addresses to machine addresses.

SSH and Telnet are management plane protocols.

147.

Which of the following has the best AD for a route?

  • Connected

  • Static

  • EIGRP summary route

  • External BGP

  • OSPF

Correct answer: Connected

A connected interface has a default administrative distance (AD) of 0. An AD is used to detect the best path when there are two or more different routes to the same destination from two different protocols.

A static route has an AD of 1. An EIGRP summary route has an AD of 5. An external BGP has an AD of 20. An OSPF route has an AD of 110.

148.

A security team member is writing a new firewall rule. Which of the following best describes what he is trying to create?

  • Mitigation techniques

  • Threat

  • Exploits

  • Vulnerabilities

Correct answer: Mitigation techniques

A mitigation technique is a way to defend against malicious activity. A firewall rule might be a mitigation strategy for protecting a vulnerable service against exploitation. 

An exploit is a tool that can be used on a vulnerability. A vulnerability is a weakness that can be exploited, such as a server that has not been patched. A threat is the risk that an attacker will exploit a vulnerability.

149.

Which two sentences are true about a prefix as a component of the routing table? (Choose two.)

  • The prefix refers to the subnet ID.

  • A prefix length of /32 is used for static host routes.

  • The prefix length for 255.255.255.0 is /16.

  • A default route is configured with a prefix length of /24.

A prefix refers to the subnet. The prefix length is a shorthand way to write the subnet ID by stating the bits that are set to one for masking. A prefix length of /32 is used for static host routes. The prefix length for 255.255.255.0 is /24. A default route is configured with a prefix length of zero. 

150.

Which term describes an OSPF router with interfaces that are in one area only?

  • Internal router

  • Backbone router

  • Intra-area

  • ABR

Correct answer: Internal router

In OSPF routing, large networks are divided into smaller areas for efficiency. An internal router is a router only in one area.

A backbone router connects to the backbone area and includes ABRs. An Area Border Router (ABR) connects to the backbone area and at least one other area. An intra-area route is a route to a subnet inside the same area as the router.

151.

Which network device should be used for sending traffic to the WAN?

  • Router

  • Bridge

  • Switch

  • Hub

Correct answer: Router

A router links networks together—including connecting to the corporate WAN—and operates at Layer 3 using IP addresses to determine the best way for a packet to be forwarded. 

A bridge uses a MAC address on Layer 2 of the OSI model. An unmanaged switch uses MAC addresses and operates at Layer 2. A hub is Layer 1 and repeats packets, regardless of their MAC or IP addresses.

152.

Which of the following is an FHRP that uses an active/active redundancy approach?

  • GLBP

  • VRRP

  • HSRP

  • STP

Correct answer: GLBP

The Gateway Load Balancing Protocol (GLBP) is a First Hop Redundancy Protocol (FHRP) that has built-in load balancing with an active/active configuration. This lets all routers share the load, rather than wait in standby mode.

The Virtual Router Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP) are FHRPs that use an active/standby approach. The Spanning Tree Protocol (STP) is used to protect against network loops.

153.

An administrator wants to configure a port security setting that instructs a switchport to trust dynamically-learned addresses. Which command is used for this?

  • switchport port-security mac-address sticky

  • switchport port-security maximum

  • switchport port-security mac-address <address>

  • switchport mode access

Correct answer: switchport port-security mac-address sticky

The "switchport port-security mac-address sticky" command tells a switch to keep dynamically learned MAC addresses. More information about an interface's port security can be found with the "show port-security interface" command. 

The "switchport port-security maximum" command overrides the default number of maximum MAC addresses associated with an interface. The "switchport port-security mac address <address>" command sets a particular MAC address as trusted. The "switchport mode" command is used to set an interface in either access or trunking mode.

154.

What are the two main bands for Wi-Fi communications?

  • 2.4 and 5 GHz

  • 2.4 and 5 MHz

  • 2.4 GHz and 5 MHz

  • 2.4 MHz and 5 GHz

  • 13.56 MHz and 3.5 GHz

Correct answer: 2.4 and 5 GHZ

The two main bands are 2.4 and 5 GHz. The 2.4-GHz band is used with older Wi-Fi standards, while the 5-GHz band is used with newer standards.

The 2.4-GHz and 900-MHz bands are used with Zigbee. The 868.42- and 908.42-MHz bands are used with Z-Wave. The 2.3- and 3.5-GHz bands are used with WiMax. The 13.56-MHz band is used with NFC.

155.

Which two of the following are attacks designed to exploit weak credentials? (Choose two.)

  • Brute-force

  • Dictionary

  • Man-in-the-middle

  • Whaling

  • Spear phishing

When an attacker has access to a file of encrypted passwords, or if they have unlimited attempts to guess an online password, they can use several types of attacks. A brute-force attack uses combinations of every character. A dictionary attack uses lists of words to start guessing.

A man-in-the-middle attack involves an attacker intercepting and modifying network packets. Spear phishing and whaling are types of phishing attacks.

156.

An organization wants to collect information for use in auditing and incident response. Which of the following is the most helpful for this?

  • Syslog

  • DHCP

  • NTP

  • NAT

  • PHB

Correct answer: Syslog

Syslog is a system logging protocol to store both significant and non-critical events on a device. Notifications can be sent over UDP port 514 to a logging console.

The Dynamic Host Configuration Protocol (DHCP) is used to assign IP addresses to hosts. The Network Time Protocol (NTP) is used to synchronize clocks. Network address translation (NAT) is used to map multiple private IP addresses to a public address. Per-hop behavior (PHB) is used to define policy and priority for a packet when traversing a hop.

157.

Which two sentences correctly describe FTP? (Choose two.)

  • An FTP control connection is used to exchange FTP commands

  • In active mode, the FTP client sends a PORT command to the FTP server

  • An FTP data connection is used to delete folders

  • FTP uses a single TCP port for both data and control traffic

The File Transfer Protocol (FTP) is used to transfer files and also send commands. A control connection is used to exchange FTP commands. In active mode, the FTP client sends a PORT command to the FTP server, although this method does not work well through firewalls.

An FTP data connection is used to transfer files. FTP uses two TCP ports. It always uses port 21 for control traffic and port 20 or some other TCP port for data.

158.

What are the three main factors that influence a router's forwarding decisions? (Choose three.)

  • Prefix length

  • Administrative distance

  • Metric

  • MAC address

  • Switchport mode

A router considers prefix length, administrative distance, and metrics when making forwarding decisions. MAC addresses and switchport mode are related to switches.

159.

Which two statements are true about static default routes? (Choose two.)

  • They can be configured with the "ip route" command.

  • They can be verified with the "show ip route" command.

  • They can be configured with the "ip address" command.

  • They can be verified with the "show interface status" command.

To configure a static route, a command like "ip route 0.0.0.0 0.0.0.0 S0/0/1" can be used. To verify the static route, use the "show ip route" command.

The "ip address" command defines an IP address for an interface. The "show interface status" command shows detailed information on port switches.

160.

Which of the following route types is preferred by default on a router?

  • Static

  • RIP

  • OSPF

  • EIGRP

  • IS-IS

Correct answer: Static

Static routes have an administrative distance (AD) of 1 by default. This makes them preferred by the router unless their administrative distance is changed.

RIP has a default AD of 120. OSPF has a default AD of 110. EIGRP has a default AD of 90. IS-IS has a default AD of 115.