No products in the cart.
Cisco CCNA Exam Questions
Page 9 of 25
161.
Which of the following is a correctly formatted URI?
-
HTTPS://server1.example.com/path/to/resource?parameter1=1234¶meter2=4567
-
HTTPS://server1.example.com/path/to/resource¶meter1=1234?parameter2=4567
-
HTTPS://server1.example.com/path/to/resource=parameter1&1234=parameter2&4567
-
HTTPS://server1.example.com/path/to/resource//parameter1=1234?parameter2=4567
Correct answer: HTTPS://server1.example.com/path/to/resource?parameter1=1234¶meter2=4567
A Uniform Resource Identifier (URI) starts with the protocol, then hostname, then path, and then the resource. The protocol ends with a colon and two slashes. The hostname has domains and subdomains separated by periods. Path names are separated by slashes. The resource starts with a question mark and has parameters separated by ampersands.
162.
Which sentence best describes the use of serialized data?
-
Data serialization allows the state of objects to be transferred over a network
-
Data serialization allows files to be encrypted before transmitting over the network
-
Data serialization compresses data to improve storage efficiency
-
Data serialization allows for faster searching of information in tables
Correct answer: Data serialization allows the state of objects to be transferred over a network
Data serialization is used to help with network automation. With data serialization, you can take the state of objects in one language and prepare them to be used in APIs so other programs can use them.
Data serialization is not related to encryption, data compression, or search lookup times.
163.
Which configuration keyword uses values found in Layer 4 headers for EtherChannel load distribution?
-
src-dst-port
-
src-dst-mac
-
src-mac
-
dst-mac
-
src-dst-ip
Correct answer: src-dst-port
EtherChannel uses the src-dst-port method with both source and destination TCP or UPD port on Layer 4 to make load distribution decisions. This would be configured with the "port-channel load-balance src-dst-port" command.
The keywords src-dst-mac, src-mac, and dst-mac are for Layer 2. The keyword src-dst-ip is for Layer 2.
164.
Which three of the following are features that were new with SNMPv3? (Choose three.)
-
Message integrity
-
Authentication
-
Encryption
-
ACL
SNMPv3 adds security features over SNMPv3. Message integrity confirms if a message has changed during transit. Authentication uses usernames and hashed passwords. Encryption is used to encode messages so that they cannot be read by unauthorized users if intercepted.
An access control list (ACL) can be used to limit which SNMP messages are processed in any version of SNMP.
165.
Which term describes the unique identifier of an AP?
-
BSSID
-
SSID
-
BSS
-
BSA
Correct answer: BSSID
The basic service set identifier (BSSID) is a unique identifier for an access point (AP). It is based on the AP's radio MAC address.
A secure set identifier (SSID) is a human-readable, non-unique identifier for a wireless network. A basic service set (BSS) is the topology of a single wireless channel centered upon an AP and includes its client hosts. A basic service area (BSA) is the physical area where an AP's signal is usable.
166.
Which term describes a tool that is used to take advantage of a security weakness?
-
Exploit
-
Vulnerability
-
Threat
-
Mitigation technique
Correct answer: Exploit
An exploit is the actual tool or code that is used to take advantage of a security weakness. It can be some code or a malicious application.
A vulnerability is a weakness that can be exploited, such as a server that has not been patched. A threat is a malicious user that can use exploits on vulnerabilities. A mitigation technique is a way to defend against malicious activity.
167.
Which two elements of a routing table are used for forwarding rather than matching? (Choose two.)
-
Next router
-
Out interface
-
Subnet
-
Mask
A routing table can be divided into matching information and forwarding information. A router uses a subnet and mask for matching, and a next router and out interface for forwarding.
168.
Which term describes the distance between a device and a time source?
-
Stratum
-
Administrative distance
-
Mnemonic
-
PHB
Correct answer: Stratum
The stratum refers to the distance to a reference clock in NTP. The lower the stratum level, the more accurate a clock is perceived.
Administrative distance is used to determine a route. A mnemonic is a descriptive field in a syslog file. Per-hop Behavior (PHB) is used with QoS.
169.
Which two of the following are valid IPv6 addresses? (Choose two.)
-
4638:573e:e1df:047c:2d7f:c976:fb87:f2e3
-
62c0::1:0:0:15
-
20bc::0:25ce::f96e
-
2bd9:1dd4:1df5:c03d:28c3:0306:76b0
IPv6 addresses are 32 hexadecimal digits that are divided into 8 groups of 4 characters each. Each quartet is separated by colons. An IPv6 address can be abbreviated by removing leading zeroes in each quartet or using a single zero if a quartet is composed of 4 zeroes. Double colons can be used only one time in an abbreviation if there are consecutive quartets of zeroes.
170.
Which command configures a switch to use a spanning tree that supports multiple trees?
-
spanning-tree mode mst
-
spanning-tree mode pvst
-
spanning-tree mode rapid-pvst
-
spanning-tree mode ?
Correct answer: spanning-tree mode mst
The global configuration command "spanning-tree mode mst" will use MSTP. The Multiple Spanning Tree Protocol supports multiple spanning trees.
The "spanning-tree mode pvt" command is a per-Vlan spanning tree mode. The "spanning-tree mode rapid-pvst" command is a per-Vlan rapid spanning tree mode. The "spanning-tree mode ?" command shows the options for the command.
171.
An administrator wants to send all "impactful" syslog messages (e.g., those indicating that something has gone wrong) to the terminal. Which command should they run to accomplish this?
-
logging console 4
-
logging console 5
-
logging console 6
-
logging console 1
Correct answer: logging console 4
Syslog messages have severity levels from 0 to 7. Message levels 0 and 1 are severe, while levels 2, 3, and 4 are "impactful." The "logging console 4" command sends any message levels 0 through 4 to the console.
Levels 5 and 6 are normal, while level 7 is for debugging.
172.
Using 802.1x EAP-based authentication, which device takes user credentials and decides to permit or deny access?
-
Authentication server
-
Authenticator
-
WLC
-
Supplicant
Correct answer: Authentication server
With 802.1x, the authentication process is passed to a dedicated authentication server (AS). This is typically a RADIUS server.
A wireless LAN controller (WLC) acts as the authenticator and provides access to the network. The supplicant is the client device making the request.
173.
Which of the following is not a core element of an effective security program?
-
Logical access control
-
User awareness
-
User training
-
Physical access control
Correct answer: Logical access control
The three basic elements of a security training program are user awareness, user training, and physical access control.
174.
What are three types of information included in a basic routing table? (Choose three.)
-
Interface
-
Next hop
-
Destination
-
Hardware address
-
Minimum age
A routing table typically has fields for the interface, destination, next hop, metric, and routes. Hardware addresses and minimum ages are included in a router's ARP table.
175.
What are three items that can be viewed from the "show ip route" command? (Choose three.)
-
Routing protocol ID
-
Prefix
-
Mask
-
Hardware address
-
VLAN
The "show ip route" command will display information that includes the routing protocol ID (L, C, S, etc), prefix (subnet ID), and mask (in prefix length format). Hardware addresses are in the ARP table. A VLAN is in a switch's MAC address table.
176.
Which two sentences correctly describe TFTP? (Choose two.)
-
TFTP does not have authentication or security.
-
TFTP is used for network boots, such as PXE.
-
TFTP uses the TCP protocol.
-
TFTP uses port 21.
The Trivial File Transfer Protocol (TFTP) is an old protocol used to easily transfer files. TFTP does not have authentication or security. TFTP is used for network boots, such as PXE.
TFTP uses the UDP protocol. TFTP uses port 69.
177.
Which command configures a default route in IPv6 using interface S0/0/0?
-
ipv6 route ::/0 S0/0/0
-
ipv6 route /0:: S0/0/0
-
ipv6 route :/0 S0/0/0
-
ipv6 route 0.0.0.0/0 S0/0/0
Correct answer: ipv6 route ::/0 S0/0/0
The default route for IPv6 follows a similar pattern to default routes on IPv4: use all 0s and a prefix length of 0. The double colon is an IPv6 abbreviation for all zeroes.
178.
What are the four HTTP verbs? (Choose four.)
-
POST
-
GET
-
PUT
-
DELETE
-
COPY
The four HTTP verbs are POST, GET, PUT, and DELETE. They relate to the CRUD terms of create, read, update, and delete, respectively.
COPY is not one of the HTTP verbs.
179.
An administrator has two switches linked together. Which two combinations of administrative modes on the interfaces at each end will give an expected operational mode of access? (Choose two.)
-
Access and access
-
Dynamic auto and dynamic auto
-
Dynamic auto and trunk
-
Trunk and dynamic desirable
If both ends of the link are access or dynamic auto, then the operational mode will be access. This is also true if one end is access and the other is dynamic auto. If one of the links is access, then the expected operational mode will be access unless the other end is trunk, which is a combination that should not be used.
If the ends are dynamic auto and trunk, then the operational mode will be trunk. If the ends are trunk and dynamic desirable, then the operational mode will trunk. If the ends are dynamic auto and dynamic desirable, then the mode will be trunk.
180.
Which sentence correctly describes the control plane in controller-based networks?
-
It refers to actions that control the data plane.
-
It refers to protocols that let network engineers manage devices.
-
It refers to the tasks needed to forward a message.
-
It refers to making logical decisions about handling a message.
-
It refers to applications such as SSH and Telnet.
Correct answer: It refers to actions that control the data plane.
Software-defined networking can be divided into data, control, and management planes. The control plane refers to actions that control how the data plane works.
The control plane refers to the tasks and logical decisions needed to forward a message. The management plane refers to protocols that let network engineers manage devices and applications such as SSH and Telnet.