0% 0 votes, 0 avg 11 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465 This quiz randomly generates 60 questions as asked in Cisco CCNA (200-301) Congratulations! CCNA Certification Exam (200-301) This quiz randomly generates 60 questions (in 60 mins) as asked in Cisco Certified Network Associate (CCNA) certification (200-301). The real 200-301 CCNA test has 100-120 questions and a total time of 120 minutes. This test randomly generates 60 questions from our question bank. For best results, practice multiple times until you achieve 100% accuracy. 1 / 65 Which of the following is the most secure method for managing a Cisco router remotely over an untrusted network? Telnet HTTP SNMPv2c SSH (Secure Shell) Explanation: SSH encrypts the entire management session, including your username and password. Telnet and HTTP send data in "clear text," meaning anyone with a packet sniffer can see your login credentials. SNMPv2c also lacks the robust encryption and authentication found in SNMPv3 or SSH. 2 / 65 Which IEEE standard defines the 802.1Q encapsulation used for VLAN Trunking? 802.3ad 802.11ax 802.1Q 802.1D Explanation: 802.1Q is the industry-standard method for identifying VLANs on a trunk link by inserting a 4-byte "tag" into the Ethernet frame header. This allows a single cable to carry traffic for multiple VLANs. 3 / 65 Refer to the exhibit. A technician has installed SwitchB and needs to configure it for remote access from the management workstation connected to SwitchA. Which set of commands is required to accomplish this task? SwitchB(config)# interface FastEthernet 0/1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# ip default-gateway 192.168.8.254 255.255.255.0 SwitchB(config-if)# no shutdown SwitchB(config)# ip default-gateway 192.168.8.254 SwitchB(config)# interface vlan 1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown SwitchB(config)# ip route 192.168.8.254 255.255.255.0 SwitchB(config)# interface FastEthernet 0/1 SwitchB(config-if)# ip address 192.168.8.252 255.255.255.0 SwitchB(config-if)# no shutdown 4 / 65 What are three advantages of VLANs? (Choose three.) VLANs establish broadcast domains in switched networks. VLANs utilize packet filtering to enhance network security. VLANs provide a method of conserving IP addresses in large networks. VLANs provide a low-latency internetworking alternative to routed networks. VLANs allow access to network services based on department, not physical location. VLANs can greatly simplify adding, moving, or changing hosts on the network 5 / 65 What is the summary route (supernet) for 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, and 192.168.3.0/24? 192.168.0.0/128 192.168.0.0/64 192.168.0.0/32 192.168.0.0/22 Explanation: These four networks share the first 22 bits. 6 / 65 Which address is the "Loopback" address used for testing the local TCP/IP stack? 127.0.0.1 255.0.0.1 1.1.1.1 255.255.255.255 Explanation: The entire 127.0.0.0/8 range is reserved for loopback testing. 7 / 65 Which configuration management tool is "agentless" and uses SSH to communicate with managed network devices? Puppet Chef Ansible Terraform Explanation: Ansible is considered "agentless" because it does not require special software installed on the target device; it typically uses standard SSH to push configurations. Puppet and Chef generally require an "agent" (client software) to be running on the managed device. 8 / 65 Which character pair is used to define an "Object" (key-value pairs) in JSON? [ ] (Square Brackets) { } (Curly Braces) < > (Angle Brackets) ( ) (Parentheses) Explanation: In JSON: 9 / 65 A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router. How should the network administrator configure the serial interface of the main office router to make the connection? Main(config)# interface serial 0/0 Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# no shut Main(config)# interface serial 0/0 Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation ppp Main(config-if)# no shut Main(config)# interface serial 0/0 Main(config-if)# ip address 172.16.1.1 255.255.255.252 Main(config-if)# encapsulation frame-relay Main(config-if)# authentication chap Main(config-if)# no shut Main(config)# interface serial 0/0 Main(config-if)#ip address 172.16.1.1 255.255.255.252 Main(config-if)#encapsulation ietf Main(config-if)# no shut 10 / 65 Which of the following is a characteristic of the TCP (Transmission Control Protocol) that distinguishes it from UDP (User Datagram Protocol)? It uses "best-effort" delivery without error recovery. It has lower overhead and is faster for real-time applications like VoIP. It uses a three-way handshake to establish a connection-oriented session. It operates at Layer 3 of the OSI model. Explanation: TCP is connection-oriented and ensures reliability via a three-way handshake (SYN, SYN-ACK, ACK). It tracks sequence numbers and acknowledges received data. UDP is connectionless (no handshake), has lower overhead, and is "best-effort," making it better for streaming but less reliable than TCP. 11 / 65 What is the primary purpose of a "Dynamic NAT" (Network Address Translation) configuration? To map one internal private IP address to one specific public IP address permanently. To map a group of internal private IP addresses to a pool of available public IP addresses. To allow multiple internal users to share a single public IP address using port numbers. To provide a secure VPN tunnel between two branch offices. Explanation: Dynamic NAT uses a pool of public addresses and assigns them on a first-come, first-served basis. Option A describes Static NAT, and Option C describes PAT (Port Address Translation), also known as "NAT Overload." 12 / 65 How does an OSPF router determine which path to a destination is "best" when multiple paths exist? It chooses the path with the lowest hop count. It calculates the cumulative "cost" based on interface bandwidth. It uses the path with the highest Administrative Distance. It selects the path with the lowest CPU utilization. Unlike RIP, which uses hop count, OSPF uses cost as its metric. Cost is calculated based on the reference bandwidth divided by the interface speed; lower cost indicates a faster, preferred path. 13 / 65 Which Cisco architecture typically uses a "Spine-Leaf" topology? Cisco SD-Access (Campus) Cisco ACI (Data Center) Traditional Three-Tier Architecture SOHO (Small Office Home Office) Explanation: Cisco ACI (Application Centric Infrastructure) in the data center relies heavily on a Spine-Leaf topology because it provides predictable latency and high bandwidth for East-West traffic (server-to-server communication). 14 / 65 If a router has four interfaces and each interface is connected to four switches, how many broadcast domains are present on the router? 1 2 4 6 The correct number of broadcast domains present on the router is C. 4. Explanation A router inherently separates broadcast domains; each of its interfaces belongs to a different network segment. Each interface connected to a switch effectively creates a separate Layer 2 segment (broadcast domain) which that specific router interface terminates. Since the router has four distinct interfaces, there are four separate broadcast domains, one for each interface connection. 15 / 65 Which technology supports the stateless assignment of IPv6 addresses? DNS DHCPv6 DHCP autoconfiguration Autoconfiguration, specifically Stateless Address Autoconfiguration (SLAAC), is the technology in IPv6 that allows a device to automatically configure its own unique IPv6 address without requiring a server to keep track of (maintain state for) the address assignments. This process uses ICMPv6 Router Solicitation and Router Advertisement messages to obtain the network prefix and default gateway information, then the host generates its own unique interface ID. A. DNS: DNS (Domain Name System) is used to translate domain names into IP addresses, but it is not the technology that assigns the IPv6 addresses themselves. DNS server information can be obtained via a stateless DHCPv6 server or manual configuration, but DNS itself is a naming service, not an address assignment protocol. B. DHCPv6: DHCPv6 can operate in both stateful and stateless modes. In stateful mode, the DHCPv6 server assigns the IPv6 address and maintains a database of leases, similar to IPv4 DHCP. In stateless mode, DHCPv6 is used in conjunction with SLAAC to provide additional information (like DNS server addresses) but does not assign the primary IPv6 address itself, which is still generated by the host using autoconfiguration (SLAAC). Therefore, autoconfiguration is the primary stateless address assignment mechanism. C. DHCP: DHCP (Dynamic Host Configuration Protocol) is primarily an IPv4 protocol and does not natively support IPv6 address assignment. The IPv6 version is DHCPv6. 16 / 65 What is the primary benefit of using EtherChannel in a switched network? It prevents loops without needing Spanning Tree Protocol. It allows multiple physical links to be treated as a single logical bundle for increased bandwidth and redundancy. It automatically assigns VLANs based on the device MAC address. It encrypts all traffic between two switches at Layer 2. It allows multiple physical links to be treated as a single logical bundle 17 / 65 When viewing a JSON data object, what do square brackets [ ] represent? A single key-value pair. An unordered list of objects. An ordered array or list of values. The beginning and end of the entire JSON file. Explanation: In JSON (JavaScript Object Notation), curly braces { } define an object (a collection of key-value pairs), while square brackets [ ] define an array (a list of multiple values or objects). For example, "interfaces": ["Gig0/0", "Gig0/1"] is an array of strings. 18 / 65 Which of the following statement is true for Class C addresses? (128.0.0.0 – 191.255.255.255): Used for medium to large networks. (192.0.0.0 – 223.255.255.255): Used for small networks. (224.0.0.0 – 239.255.255.255): Reserved for multicast groups. (0.0.0.0 – 127.255.255.255): Reserved for large organizations; 127.x.x.x is used for loopback/testing. (240.0.0.0 – 255.255.255.255): Reserved for experimental/future use. Class A (0.0.0.0 – 127.255.255.255): Reserved for large organizations; 127.x.x.x is used for loopback/testing. Class B (128.0.0.0 – 191.255.255.255): Used for medium to large networks. Class C (192.0.0.0 – 223.255.255.255): Used for small networks. Class D (224.0.0.0 – 239.255.255.255): Reserved for multicast groups. Class E (240.0.0.0 – 255.255.255.255): Reserved for experimental/future use. Private IP Address Ranges (Non-Routable): Class A Private: 10.0.0.0 – 10.255.255.255. Class B Private: 172.16.0.0 – 172.31.255.255. Class C Private: 192.168.0.0 – 192.168.255.255. APIPA (Automatic Private IP): 169.254.0.0 – 169.254.255.255. 19 / 65 In 172.16.10.16/24 network how many hosts are possible? 16 14 256 254 20 / 65 A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next? It checks the configuration register. It attempts to boot from a TFTP server. It loads the first image file in flash memory. It inspects the configuration file in NVRAM for boot instructions. 21 / 65 What is the maximum standardized distance for a 1000BASE-T link over Cat5e copper cabling? 500 meters 50 meters 100 meters 2 kilometers Explanation: The standard limit for Ethernet over twisted-pair copper (Cat5e, Cat6, etc.) is 100 meters (328 feet). Distances beyond this require repeaters or fiber optics. 22 / 65 What is the compressed format of the IPv6 address 2001:0db8:0000:0000:0000:0000:0000:0001? 2001:db8::1 2001:db8:0:1 2001:db8::0::1 2001:d8::1 Explanation: Rules for compression: Remove leading zeros (0db8 -> db8). Replace a single contiguous block of all-zero hextets with :: (only once).Result: 2001:db8::1. 23 / 65 What is the purpose of "Inside Global" in NAT terminology? The private IP address of a host on the local network. The public IP address assigned by the ISP that represents the internal host to the outside world. The IP address of a web server located on the internet. The MAC address of the NAT router. Explanation: NAT terms are often confusing: Inside Local is the private IP (e.g., 192.168.1.5). Inside Global is the public IP that the rest of the internet sees when that host communicates. 24 / 65 Which IPv6 address type communication is restricted to a single local segment and is not routable? Global unicast Unique local Link-local Multicast 25 / 65 Which two statements about IPv6 and routing protocols are true? (Choose two.) Link-local addresses are used to form routing adjacencies. OSPFv3 was developed to support IPv6 routing. EIGRP, OSPF, and BGP are the only routing protocols that support IPv6. Loopback addresses are used to form routing adjacencies. EIGRPv3 was developed to support IPv6 routing. The two true statements about IPv6 and routing protocols are A and B. A. Link-local addresses are used to form routing adjacencies. B. OSPFv3 was developed to support IPv6 routing. Explanation Link-local addresses: In IPv6, routing protocols like OSPFv3 and EIGRP use the link-local addresses (which start with FE80::/10) of neighboring routers as the next-hop address for dynamic routes and to establish adjacencies. Link-local addresses are unique to a specific network segment and are not forwarded by routers. OSPFv3: OSPF version 3 was specifically developed to support IPv6 addressing and prefixes, building upon the OSPFv2 (IPv4) framework. 26 / 65 Which command would you use to verify the OSPF neighbor relationships and ensure that a router is successfully communicating with its adjacent OSPF routers? show ip route ospf show ip protocols show ip ospf neighbor show ospf interface brief Explanation: The show ip ospf neighbor command is the primary troubleshooting tool to check if a router has reached the FULL state with its neighbors. If a neighbor is not listed here, it indicates a mismatch in parameters like Area ID, Authentication, or Timers. 27 / 65 In the context of Puppet configuration management, what is the "Manifest"? A list of all hardware devices in the inventory. A file containing the desired state configuration for a device, written in a Ruby-based DSL. The physical serial number of the managed switch. A command-line tool used to push configurations via SSH. In Puppet, you define how a device should look (e.g., "Interface Gi0/1 should be up and in VLAN 10") in a file called a Manifest. The Puppet agent then ensures the device matches that state. This is part of "Infrastructure as Code." 28 / 65 Which HTTP verb is used in a REST API to create a NEW resource on the server? GET PUT POST DELETE POST = Create (New resource) GET = Read (Retrieve data) PUT/PATCH = Update (Modify existing) DELETE = Delete (Remove) 29 / 65 What is the binary representation of the decimal number 172? 10101110 10101100 10101111 11111100 30 / 65 Which three non-overlapping channels are available in the 2.4 GHz Wi-Fi band (in the US)? 1, 5, 10 1, 6, 11 2, 7, 12 36, 40, 44 Explanation: In the 2.4 GHz spectrum, channels are 22MHz wide but spaced only 5MHz apart. Channels 1, 6, and 11 are the only combination that does not overlap, preventing signal interference. 31 / 65 Which command is used to configure a router to obtain its IP address automatically from a DHCP server? ip dhcp client ip helper-address ip address dhcp ip dhcp pool C. ip address dhcp 32 / 65 Which of the following statement is true for Class A addresses? (128.0.0.0 – 191.255.255.255): Used for medium to large networks. (192.0.0.0 – 223.255.255.255): Used for small networks. (224.0.0.0 – 239.255.255.255): Reserved for multicast groups. (0.0.0.0 – 127.255.255.255): Reserved for large organizations; 127.x.x.x is used for loopback/testing. (240.0.0.0 – 255.255.255.255): Reserved for experimental/future use. Class A (0.0.0.0 – 127.255.255.255): Reserved for large organizations; 127.x.x.x is used for loopback/testing. Class B (128.0.0.0 – 191.255.255.255): Used for medium to large networks. Class C (192.0.0.0 – 223.255.255.255): Used for small networks. Class D (224.0.0.0 – 239.255.255.255): Reserved for multicast groups. Class E (240.0.0.0 – 255.255.255.255): Reserved for experimental/future use. Private IP Address Ranges (Non-Routable): Class A Private: 10.0.0.0 – 10.255.255.255. Class B Private: 172.16.0.0 – 172.31.255.255. Class C Private: 192.168.0.0 – 192.168.255.255. APIPA (Automatic Private IP): 169.254.0.0 – 169.254.255.255. 33 / 65 What is the default Administrative Distance (AD) of an OSPF route? 1 90 110 120 Explanation: AD is the "trustworthiness" of a route. Lower is better. OSPF is 110. For comparison: Connected is 0, Static is 1, EIGRP is 90, and RIP is 120. 34 / 65 What is the purpose of the "Underlay" in a fabric network? To provide IP connectivity between the physical switches and routers so tunnels can be built. To define user policies and access controls. To run the VXLAN encapsulation. To separate the control plane from the data plane. Explanation: The Underlay is the physical foundation. Its only job is to ensure that all network devices can reach each other (usually via an IGP like OSPF or IS-IS) so that the Overlay tunnels (VXLAN) can be established on top. 35 / 65 Which command sequence can you enter to create VLAN 20 and assign it to an interface on a switch? Switch(config)#vlan 20Switch(config)#Interface gig x/ySwitch(config-if)#switchport access vlan 20 Switch(config)#Interface gig x/y Switch(config-if)#vlan 20 Switch(config-vlan)#switchport access vlan 20 Switch(config)#vlan 20 Switch(config)#Interface vlan 20 Switch(config-if)#switchport trunk native vlan 20 Switch(config)#vlan 20 Switch(config)#Interface vlan 20 Switch(config-if)#switchport access vlan 20 Switch(config)#vlan 20 Switch(config)#Interface vlan 20 Switch(config-if)#switchport trunk allowed vlan 20 The correct command sequence to create VLAN 20 and assign it to an interface is: A. Switch(config)#vlan 20 Switch(config)#Interface gig x/y Switch(config-if)#switchport access vlan 20 Reasoning Step 1: vlan 20 – This command enters VLAN configuration mode and creates the VLAN in the switch's database. Step 2: interface gig x/y – This enters the configuration mode for the specific physical interface. Step 3: switchport access vlan 20 – This command assigns the interface to VLAN 20. On most modern Cisco switches, this command also implicitly sets the port to access mode if not already configured, though it is best practice to precede it with switchport mode access. Why the others are incorrect: B: You cannot create a VLAN by typing the vlan command while inside a physical interface's configuration mode (config-if). C, D, and E: These options use interface vlan 20, which creates a VLAN Interface (a Layer 3 Switch Virtual Interface or SVI). This is used for routing and management, not for assigning a physical switch port to a VLAN. Furthermore, switchport commands are Layer 2 commands and cannot be applied to an SVI. 36 / 65 Which protocol is commonly used by the NETCONF interface to ensure secure transport? Telnet SSH TFTP UDP Explanation: NETCONF (Network Configuration Protocol) typically runs over SSH (port 830) to ensure that all configuration data is encrypted and the connection is authenticated. 37 / 65 In the context of SDN (Software-Defined Networking), which "direction" does the Northbound API face? Between the SDN Controller and the physical switches (Data Plane). Between the SDN Controller and the applications or network management scripts. Between two different SDN Controllers in different data centers. Between the physical switch and the end-user device. Explanation: In SDN architecture: Northbound APIs allow applications and programmers to communicate with the controller to tell it what the network should do. Southbound APIs (like OpenFlow or NETCONF) are used by the controller to push those instructions down to the actual hardware switches. 38 / 65 A router receives a packet for 192.168.1.155. It has routes for 192.168.1.0/24 and 192.168.1.128/25. Which route will it use? 192.168.1.128/12 192.168.1.128/24 192.168.1.128/25 None of the above Explanation: The "Longest Prefix Match" rule states the router always chooses the most specific mask (/25 is more specific than /24). 39 / 65 Which of the following describes the difference between a Hub and a Bridge? A Hub operates at Layer 3, while a Bridge operates at Layer 2. A Hub is a single collision domain, while a Bridge separates collision domains. A Bridge is used for long-distance fiber, while a Hub is for local copper. A Hub uses MAC addresses to forward data, while a Bridge uses IP addresses. Explanation: A Hub is a "dumb" Layer 1 device that broadcasts all incoming traffic out of every port, meaning all devices share one collision domain. A Bridge (the predecessor to the modern switch) operates at Layer 2 and uses a MAC address table to segment the network into multiple collision domains, reducing congestion. 40 / 65 Which of the following range is reserved for experimental/future use? (128.0.0.0 – 191.255.255.255) (192.0.0.0 – 223.255.255.255) (224.0.0.0 – 239.255.255.255) (0.0.0.0 – 127.255.255.255) (240.0.0.0 – 255.255.255.255) Class A (0.0.0.0 – 127.255.255.255): Reserved for large organizations; 127.x.x.x is used for loopback/testing. Class B (128.0.0.0 – 191.255.255.255): Used for medium to large networks. Class C (192.0.0.0 – 223.255.255.255): Used for small networks. Class D (224.0.0.0 – 239.255.255.255): Reserved for multicast groups. Class E (240.0.0.0 – 255.255.255.255): Reserved for experimental/future use. Private IP Address Ranges (Non-Routable): Class A Private: 10.0.0.0 – 10.255.255.255. Class B Private: 172.16.0.0 – 172.31.255.255. Class C Private: 192.168.0.0 – 192.168.255.255. APIPA (Automatic Private IP): 169.254.0.0 – 169.254.255.255. 41 / 65 Which subnet mask is most efficient for a point-to-point serial link between two routers? /30 /32 /64 /128 42 / 65 What are three benefits of implementing VLANs? (Choose three.) A higher level of network security can be reached by separating sensitive data traffic from other network traffic. A more efficient use of bandwidth can be achieved allowing many physical groups to use the same network infrastructure. A more efficient use of bandwidth can be achieved allowing many logical networks to use the same network infrastructure. Broadcast storms can be mitigated by increasing the number of broadcast domains, thus reducing their size. Broadcast storms can be mitigated by decreasing the number of broadcast domains, thus increasing their size. VLANs make it easier for IT staff to configure new logical groups, because the VLANs all belong to the same broadcast domain. Port-based VLANs increase switch-port use efficiency, thanks to 802.1Q trunks. 43 / 65 What is the primary difference between a Type 1 and Type 2 Hypervisor? Type 1 runs as an application on an OS; Type 2 runs on bare metal. Type 1 runs directly on bare metal hardware; Type 2 runs as software on top of an OS. Type 1 is for desktops; Type 2 is for data centers. Type 1 does not support networking. Explanation: Type 1 (Bare Metal): Installs directly on hardware (e.g., ESXi, Hyper-V). Efficient for servers. Type 2 (Hosted): Runs as an app on Windows/Mac (e.g., VMware Workstation, VirtualBox). 44 / 65 What is the Default Subnet Masks for Class C IPv4 addresses? 255.0.0.0 (or /8) 255.255.0.0 (or /16) 255.255.255.0 (or /24) 255.255.255.255 (or /32) 45 / 65 Which layer of the OSI model is responsible for logical addressing and determining the best path for data to travel across different networks? Layer 2 (Data Link) Layer 3 (Network) Layer 4 (Transport) Layer 7 (Application) Explanation: The Network Layer (Layer 3) handles logical addressing (IP addresses) and routing. Routers operate at this layer to determine the best path for packets. Layer 2 handles physical addressing (MAC), Layer 4 handles end-to-end communication (TCP/UDP), and Layer 7 is where user applications interact with the network. 46 / 65 Which type of fiber-optic cabling is most appropriate for a 10-kilometer link between two buildings? Multimode (OM3) Multimode (OM4) Single-mode (OS2) Shielded Twisted Pair (STP) Explanation: Single-mode fiber has a much smaller core than multimode, which allows light to travel long distances (up to 40km or more) with very little signal loss (attenuation). Multimode (OM3/OM4) is designed for short distances, typically within a building or data center (up to 400–500 meters). 47 / 65 Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices? enable cdp cdp enable cdp run run cdp 48 / 65 In a Wireless LAN, what is the role of a Wireless LAN Controller (WLC) in a "Split-MAC" architecture? It handles real-time MAC operations like beaconing and frame acknowledgment. It stores the data traffic locally so it doesn't have to travel to the wired network. It manages centralized tasks like security, roaming, and radio resource management. It provides power to the Access Points via Ethernet cables. Explanation: In a Split-MAC architecture (used with Lightweight APs), the Access Point handles "real-time" tasks (like frame encryption/acknowledgment), while the WLC handles "management" tasks (like authentication and coordination across multiple APs). The AP and WLC communicate via the CAPWAP protocol. 49 / 65 What is the function of a Dynamic ARP Inspection (DAI) on a switch? It limits the number of MAC addresses allowed on a single port. It validates ARP packets in a network by comparing them against the DHCP Snooping binding database. It encrypts ARP messages to prevent them from being read by sniffers. It automatically assigns VLANs to devices based on their ARP requests. Explanation: DAI is a security feature that prevents ARP spoofing/poisoning attacks. It intercepts ARP requests and responses on "untrusted" ports and checks if the MAC-to-IP binding is legitimate based on a trusted database (created by DHCP Snooping). If the binding doesn't match, the ARP packet is dropped. 50 / 65 Which Cisco DNA Center feature provides a "time-machine" ability to look back at network health and issues up to 14 days in the past? SD-Access Design Assurance Provision Explanation: Cisco DNA Assurance collects telemetry data from devices to provide visibility, troubleshooting, and "Network Time Travel" to see exactly what happened during a specific incident in the past. 51 / 65 Which of the following describes the function of First Hop Redundancy Protocols (FHRP) like HSRP or GLBP? They allow two routers to share a single virtual IP and MAC address to act as a default gateway for end devices. They automatically update the routing table when a WAN link goes down. They provide encryption for data as it moves from the LAN to the ISP. They assign IP addresses to clients dynamically. Explanation: FHRPs provide high availability for the "first hop" (the default gateway). By using a Virtual IP, if the primary router fails, the standby router takes over the virtual IP immediately. The end-user devices (PCs) never lose their gateway connection because their configuration points to the virtual IP, not the physical one. 52 / 65 Which command is used to configure a Cisco router to synchronize its internal clock with an external time source at IP address 209.165.200.225? ntp peer 209.165.200.225 clock set 209.165.200.225 ntp server 209.165.200.225 snmp-server host 209.165.200.225 53 / 65 Can the address 172.31.255.254/20 be assigned to a host? Yes No Not enough information 54 / 65 In a virtualized environment, what function does a "vSwitch" perform? It routes traffic between different physical data centers. It connects virtual machines (VMs) to each other and to the physical network interface. It acts as a firewall for the physical router. It encrypts hard drive data. Explanation: A virtual switch (vSwitch) is software that mimics a physical switch. It allows VMs on the same host to communicate and bridges them to the physical NIC (pNIC) to reach the outside world. 55 / 65 When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU? It continues operating normally. It goes into a down/down state. It becomes the root bridge for the configured VLAN. It goes into an errdisable state. 56 / 65 What is the primary goal of "Intent-Based Networking" (IBN)? To manually configure every device using CLI scripts. To capture business intent and automatically translate it into network policies and configurations. To replace all routers with Layer 2 switches. To exclusively use open-source software for routing. Explanation: IBN focuses on the desired outcome (intent). The administrator defines what the network should do (e.g., "Give Voice traffic highest priority"), and the automated system figures out how to configure the devices to achieve that state and continuously verifies it. 57 / 65 Which Quality of Service (QoS) mechanism is used to drop "excess" traffic to maintain a specific configured bit rate? Classification Marking Queuing Policing Explanation: Policing manages bandwidth by dropping or re-marking traffic that exceeds a defined rate. This is different from Shaping, which buffers (delays) the excess traffic in a queue rather than dropping it immediately. Policing is typically used by ISPs at the entry point of their network. 58 / 65 Which device makes forwarding decisions based on destination IP addresses? Layer 2 Switch Hub Router Access Point Explanation: A Router (or Layer 3 switch) operates at the Network Layer (OSI Layer 3) and uses logical IP addresses to determine the best path to a destination network. Layer 2 switches use MAC addresses. 59 / 65 What is the primary function of a Next-Generation Firewall (NGFW) compared to a traditional stateful firewall? It only filters traffic based on port numbers. It uses deep packet inspection (DPI) to identify applications and threats within the payload. It operates exclusively at Layer 2. It cannot decrypt SSL/TLS traffic. Explanation: NGFWs go beyond simple port/protocol filtering. They include Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Application Visibility and Control (AVC) to see what the traffic actually is (e.g., blocking "Facebook Games" but allowing "Facebook Chat"). 60 / 65 What is the function of a Site-to-Site IPsec VPN's "Phase 1" (IKEv1/IKEv2)? To encrypt the actual user data (payload). To establish a secure management channel between the two VPN endpoints. To assign IP addresses to remote clients. To check if the remote office has a valid antivirus. Explanation: Phase 1 creates a secure "tunnel for the tunnel." It authenticates the peers and negotiates encryption for the control traffic. Once Phase 1 is secure, Phase 2 (IPsec) is negotiated to actually move the user data. 61 / 65 How many usable host addresses are available in a /30 subnet? 1 2 4 6 62 / 65 What will happen if a private IP address is assigned to a public interface connected to an ISP? Addresses in a private range will be not be routed on the Internet backbone. Only the ISP router will have the capability to access the public network. The NAT process will be used to translate this address to a valid IP address. A conflict of IP addresses happens, because other public routers can use the same range. 63 / 65 Which of the following are commonly used encoding methods for data in REST APIs? (Choose two) XML YAML JSON HTML SNMP 64 / 65 Which of the following is the default binary prefix used for IPv6 Link-Local addresses? 2000::/3 FC00::/7 FE80::/10 FF00::/8 65 / 65 In an SNMP (Simple Network Management Protocol) architecture, what is the role of the MIB (Management Information Base)? It is the software that runs on the Network Management Station (NMS). It is a structured database on the device that defines the variables the manager can query. It is the message sent by a device to alert the manager of an event. It is the authentication key used to encrypt SNMPv3 traffic. Explanation: The MIB is a hierarchical database used by the SNMP agent on a device (like a router) to organize information about the device's status (CPU, interface traffic, etc.). The SNMP Manager uses the MIB to know what data points it is allowed to read or change. Your score is 0% Restart quiz