200-301: Cisco Certified Network Associate (CCNA) Part 14
Question #: 801
Topic #: 1
Which cable type must be used to interconnect one switch using 1000 BASE-SX GBIC modules and another switch using 1000 BASE-SX SFP modules?
A. LC to SC
B. SC to SC
C. LC to LC
D. SC to ST
Selected Answer: A
Question #: 802
Topic #: 1
DRAG DROP
–
Drag and drop the virtualization concepts from the left onto the matching statements on the right.
Suggestion Answer:
Question #: 803
Topic #: 1
What is a benefit of a point-to-point leased line?
A. low cost
B. full-mesh capability
C. simplicity of configuration
D. flexibility of design
Selected Answer: C
Question #: 804
Topic #: 1
Why is TCP desired over UDP for applications that require extensive error checking, such as HTTPS?
A. UDP uses sequencing data for packets to arrive in order, and TCP offers the capability to receive packets in random order.
B. UDP uses flow control mechanisms for the delivery of packets, and TCP uses congestion control for efficient packet delivery.
C. UDP reliably guarantees delivery of all packets, and TCP drops packets under heavy load.
D. UDP operates without acknowledgments, and TCP sends an acknowledgment for every packet received.
Selected Answer: D
Question #: 805
Topic #: 1
Which component controls and distributes physical resources for each virtual machine?
A. hypervisor
B. OS
C. CPU
D. physical enclosure
Selected Answer: A
Question #: 806
Topic #: 1
What is the role of nonoverlapping channels in a wireless environment?
A. to increase bandwidth
B. to stabilize the RF environment
C. to allow for channel bonding
D. to reduce interference
Selected Answer: D
Question #: 807
Topic #: 1
What are two advantages of implementing a controller-based architecture instead of traditional network architecture? (Choose two.)
A. It allows for seamless connectivity to virtual machines.
B. It increases security against denial-of-service attacks.
C. It supports complex and high-scale IP addressing schemes.
D. It enables configuration task automation.
E. It provides increased scalability and management options.
Selected Answer: DE
Question #: 808
Topic #: 1
What is the purpose of the service-set identifier?
A. It identifies the wireless network to which an application must connect.
B. It identifies the wired network to which a network device is connected.
C. It identifies the wired network to which a user device is connected.
D. It identifies a wireless network for a mobile device to connect.
Selected Answer: D
Question #: 809
Topic #: 1
SIMULATION –
Guidelines –
This is a lab item in which tasks will be performed on virtual devices
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked the lab closes and cannot be reopened.
Topology –
Tasks –
All physical cabling is in place and verified. Connectivity between all four switches must be established and operational. All ports are pre-configured as 802.1q trunks.
1. Configure both SW-1 and SW-2 ports e0/1 and e0/2 to permit only the allowed VLANs
2. Configure both SW-3 and SW-4 ports e0/2 to permit only the allowed VLANs
3. Configure both SW-1 and SW-2 e0/1 ports to send and receive untagged traffic over VLAN 99
4. Configure both SW-3 and SW-4 ports e0/0 and e0/1 for link aggregation using the industry standard protocol. All ports must immediately negotiate the link aggregation
5. Permit only the allowed VLANs on the new link
Suggestion Answer:
Question #: 810
Topic #: 1
How do UTP and STP cables compare?
A. UTP cables provide faster and more reliable data transfer rates and STP cables are slower and less reliable.
B. STP cables are shielded and protect against electromagnetic interference and UTP lacks the same protection against electromagnetic interference.
C. STP cables are cheaper to procure and easier to install and UTP cables are more expensive and harder to install.
D. UTP cables are less prone to crosstalk and interference and STP cables are more prone to crosstalk and interference.
Selected Answer: B
Question #: 811
Topic #: 1
What are two disadvantages of a full-mesh topology? (Choose two.)
A. It requires complex configuration.
B. It needs a high MTU between sites.
C. It works only with BGP between sites.
D. It has a high implementation cost.
E. It must have point-to-point communication.
Selected Answer: AD
Question #: 812
Topic #: 1
DRAG DROP
–
Drag and drop the wireless standards from the left onto the number of nonoverlapping channels they support on the right.
Suggestion Answer:
Question #: 813
Topic #: 1
Which technology allows for multiple operating systems to be run on a single host computer?
A. virtual routing and forwarding
B. virtual device contexts
C. network port ID virtualization
D. server virtualization
Selected Answer: D
Question #: 814
Topic #: 1
Why would an administrator choose to implement an automated network management solution?
A. to reduce operational costs
B. to support simpler password policies
C. to enable “box by box” configuration and deployment
D. to limit recurrent management costs
Selected Answer: A
Question #: 815
Topic #: 1
What is a function of the core and distribution layers in a collapsed-core architecture?
A. The router can support HSRP for Layer 2 redundancy in an IPv6 network.
B. The core and distribution layers are deployed on two different devices to enable failover.
C. The router operates on a single device or a redundant pair.
D. The router must use IPv4 and IPv6 addresses at Layer 3.
Selected Answer: C
Question #: 816
Topic #: 1
What must be considered before deploying virtual machines?
A. resource limitations, such as the number of CPU cores and the amount of memory
B. support for physical peripherals, such as monitors, keyboards, and mice
C. whether to leverage VSM to map multiple virtual processors to two or more virtual machines
D. location of the virtual machines within the data center environment
Selected Answer: A
Question #: 817
Topic #: 1
What are two facts that differentiate optical-fiber cabling from copper cabling? (Choose two.)
A. It is less expensive when purchasing patch cables.
B. It carries electrical current further distances for PoE devices.
C. It provides greater throughput options.
D. It has a greater sensitivity to changes in temperature and moisture.
E. It carries signals for longer distances.
Selected Answer: CE
Question #: 818
Topic #: 1
What are two behaviors of a point-to-point WAN topology? (Choose two.)
A. It leverages a dedicated connection.
B. It provides direct connections betwaen each router in the topology.
C. It delivers redundancy between the central office and branch offices.
D. It uses a single router to route traffic between sites.
E. It connects remote networks through a single line.
Selected Answer: AE
Question #: 819
Topic #: 1
What is a link-local all-nodes IPv6 multicast address?
A. ff02:0:0:0:0:0:0:1
B. 2004:33c:94d9:431e:255::
C. fffe:034:0dd:45d6:789e::
D. fe80:4433:034:0dd::2
Selected Answer: A
Question #: 820
Topic #: 1
Which is a reason to implement IPv4 private addressing?
A. Comply with PCI regulations.
B. Reduce the size of the forwarding table on network routers.
C. Reduce the risk of a network security breach.
D. Comply with local law.
Selected Answer: C
Question #: 821
Topic #: 1
Which signal frequency appears 60 times per minute?
A. 1 Hz signal
B. 1 GHz signal
C. 60 Hz signal
D. 60 GHz signal
Selected Answer: A
Question #: 822
Topic #: 1
What is a function of spine-and-leaf architecture?
A. offers predictable latency of the traffic path between end devices
B. mitigates oversubscription by adding a layer of leaf switches
C. exclusively sends multicast traffic between servers that are directly connected to the spine
D.limits payload size of traffic within the leaf layer
Selected Answer: A
Question #: 823
Topic #: 1
What is a function of an endpoint?
A. It passes unicast communication between hosts in a network.
B. It transmits broadcast traffic between devices in the same VLAN.
C. It provides security between trusted and untrusted sections of the network.
D. It is used directly by an individual user to access network services.
Selected Answer: D
Question #: 824
Topic #: 1
What is a function of MAC address learning?
A. It is disabled by default on all interfaces connected to trunks.
B. It increases security on the management VLAN.
C. It is enabled by default on all VLANs and interfaces.
D. It increases the potential for MAC address flooding.
Selected Answer: C
Question #: 825
Topic #: 1
Which IPv6 address range is suitable for anycast addresses for distributed services such as DHCP or DNS?
A. FF00:1/12
B. 2001:db8:0234:ca3e::1/128
C. FE80::1/10
D. 2002:db84:3f30:ca84:be76:2/64
Selected Answer: B
Question #: 826
Topic #: 1
What is a similarity between OM3 and OM4 fiber optic cable?
A. Both have a 62.5 micron core diameter.
B. Both have a 100 micron core diameter.
C. Both have a 50 micron core diameter.
D. Both have a 9 micron core diameter.
Selected Answer: C
Question #: 827
Topic #: 1
Which device segregates a network into separate zones that have their own security policies?
A. IPS
B. switch
C. access point
D. firewall
Selected Answer: D
Question #: 828
Topic #: 1
What is the primary purpose of private address space?
A. limit the number of nodes reachable via the Internet
B. simplify the addressing in the network
C. conserve globally unique address space
D. reduce network complexity
Selected Answer: C
Question #: 829
Topic #: 1
What is a characteristic of a collapsed-core network topology?
A. It enables all workstations in a SOHO environment to connect on a single switch with internet access.
B. It enables the core and access layers to connect to one logical distribution device over an EtherChannel.
C. It allows wireless devices to connect directly to the core layer, which enables faster data transmission.
D. It allows the core and distribution layers to run as a single combined layer.
Selected Answer: D
Question #: 830
Topic #: 1
A technician receives a report of network slowness and the issue has been isolated to the interface FastEthemet0/13. What is the root cause of the issue?
FastEthernet0/13 is up, line protocol is up
Hardware is Fast Ethernet, address is 0001.4d27.66cd (bia 0001.4d27.66cd)
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 250/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive not set –
Auto-duplex (Full) Auto Speed (100), 100BaseTX/FX
ARP type: ARPA, ARP Timeout 04:00:00
Last input 18:52:43, output 00:00:01, output hang never
Last clearing of “show interface” counters never
Queueing strategy: fifo –
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 12000 bits/sec, 6 packets/sec
5 minute output rate 24000 bits/sec, 6 packets/sec
14488019 packets input, 2434163609 bytes
Received 345348 broadcasts, 0 runts, 0 giants, 0 throttles
261028 input errors, 259429 CRC, 1599 frame, 0 overrun, 0 ignored
0 watchdog, 84207 multicast
0 input packets with dribble condition detected
19658279 packets output, 3529106068 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
A. local buffer overload
B. err-disabled port on the far end
C. physical errors
D. duplicate IP addressing
Selected Answer: C
Question #: 831
Topic #: 1
What occurs when overlapping Wi-Fi channels are implemented?
A. Users experience poor wireless network performance.
B. Wireless devices are unable to distinguish between different SSIDs.
C. The wireless network becomes vulnerable to unauthorized access.
D. Network communications are open to eavesdropping.
Selected Answer: A
Question #: 832
Topic #: 1
Refer to the exhibit. An administrator received a call from a branch office regarding poor application performance hosted at the headquarters. Ethernet 1 is connected between Router1 and the LAN switch. What identifies the issue?
A. The MTU is not set to the default value.
B. There is a duplex mismatch.
C. The QoS policy is dropping traffic.
D. The link is over utilized.
Selected Answer: B
Question #: 833
Topic #: 1
DRAG DROP
–
Drag and drop the cloud-computing components from the left onto the correct descriptions on the right.
Suggestion Answer:
Question #: 834
Topic #: 1
What is the functionality of the Cisco DNA Center?
A. IP address pool distribution scheduler
B. data center network policy controller
C. console server that permits secure access to all network devices
D. software-defined controller for automation of devices and services
Selected Answer: D
Question #: 835
Topic #: 1
Refer to the exhibit. Which configuration enables an EtherChannel to form dynamically between SW1 and SW2 by using an industry-standard protocol, and to support full IP connectivity between all PCs?
A. SW1#
interface Gi0/1
switchport
switchport mode access
channel-group 1 mode active
!
interface Gi0/2
switchport
switchport mode access
channel-group 1 mode active
SW2#
interface Gi0/1
switchport
switchport mode access
channel-group 1 mode desirable
!
interface Gi0/2
switchport
switchport mode access
channel-group 1 mode desirable
B. SW1#
interface Gi0/1
switchport
switchport mode trunk
channel-group 1 mode on
!
interface Gi0/2
switchport
switchport mode trunk
channel-group 1 mode auto
SW2#
interface Gi0/1
switchport
switchport mode trunk
channel-group 1 mode auto
!
interface Gi0/2
switchport
switchport mode trunk
channel-group 1 mode on
interface port-channel 1
switchport
switchport mode trunk
C. SW1#
interface Gi0/1
switchport
switchport mode trunk
channel-group 1 mode active
!
interface Gi0/2
switchport
switchport mode trunk
channel-group 1 mode active
SW2#
interface Gi0/1
switchport
switchport mode trunk
channel-group 1 mode passive
!
interface Gi0/2
switchport
switchport mode trunk
channel-group 1 mode passive
D. SW1#
interface Gi0/1
switchport
switchport mode trunk
channel-group 1 mode auto
!
interface Gi0/2
switchport
switchport mode trunk
channel-group 1 mode auto
SW2#
interface Gi0/1
switchport
switchport mode trunk
channel-group 1 mode desirable
!
interface Gi0/2
switchport
switchport mode trunk
channel-group 1 mode desirable
Selected Answer: C
Question #: 836
Topic #: 1
Which functionality is provided by the console connection on a Cisco WLC?
A. HTTP-based GUI connectivity
B. secure in-band connectivity for device administration
C. out-of-band management
D. unencrypted in-band connectivity for file transfers
Selected Answer: B
Question #: 837
Topic #: 1
Refer to the exhibit. Host A switch interface is configured in VLAN 2. Host D sends a unicast packet destined for the IP address of host A.
What does the switch do when it receives the frame from host D?
A. It floods the frame out of every ports except the source port.
B. It creates a broadcast storm.
C. It shuts down the source port and places it in err-disable mode.
D. It drops the frame from the MAC table of the switch.
Selected Answer: A
Question #: 838
Topic #: 1
Refer to the exhibit. A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-Ghz clients connect? (Choose two.)
A. Enable the Status option.
B. Set the Radio Policy option to 802.11g Only.
C. Set the Radio Policy option to 802.11a Only.
D. Set the Interface/Interface Group(G) to an interface other than guest.
E. Enable the Broadcast SSID option.
Selected Answer: AB
Question #: 839
Topic #: 1
How does Rapid PVST+ create a fast loop-free network topology?
A. It uses multiple active paths between end stations.
B. It requires multiple links between core switches.
C. It maps multiple VLANs into the same spanning-tree instance.
D. It generates one spanning-tree instance for each VLAN.
Selected Answer: D
Question #: 840
Topic #: 1
Which two functions does a WLC perform in the lightweight access-point architecture that an AP performs independently in an autonomous architecture? (Choose two.)
A. managing RF channels, including transmission power
B. handling the association, authentication, and roaming of wireless clients
C. sending and processing beacon frames
D. encrypting and decrypting traffic that uses the WAP protocol family
E. preventing collisions between wireless clients on the same RF channel
Selected Answer: AB
Question #: 841
Topic #: 1
Refer to the exhibit. A network engineer is configuring a wireless LAN with Web Passthrough Layer 3 Web Policy. Which action must the engineer take to complete the configuration?
A. Set the Layer 2 Security to 802.1X.
B. Enable TKIP and CCMP256 WPA2 Encryption.
C. Enable the WPA Policy.
D. Set the Layer 2 Security to None.
Selected Answer: D
Question #: 842
Topic #: 1
A network administrator plans an update to the WI-FI networks in multiple branch offices. Each location is configured with an SSID called “Office”. The administrator wants every user who connects to the SSID at any location to have the same access level. What must be set the same on each network to meet the requirement?
A. radio policy
B. profile name
C. NAS-ID configuration
D. security policies
Selected Answer: D
Question #: 843
Topic #: 1
Refer to the exhibit. The P2P Blocking Action option is disabled on the WLC. The security team has a new requirement for each client to retain their assigned IP addressing as the clients move between locations in the campus network. Which action completes this configuration?
A. Enable the Static IP Tunneling option.
B. Disable the Coverage Hole Detection option.
C. Set the P2P Blocking Action option to Forward-UpStream.
D. Check the DHCP Addr. Assignment check box.
Selected Answer: A
Question #: 844
Topic #: 1
Refer to the exhibit. A multivendor network exists and the company is implementing VoIP over the network for the first time. Which configuration is needed to implement the neighbor discovery protocol on the interface and allow it to remain off for the remaining interfaces?
A. SW1(config)#lldp run –
SW1(config)#interface gigabitethernet1/0/1
SW1(config-if)#lldp enable
B. SW1(config)#no cdp run –
SW1(config)#interface gigabitethernet1/0/1
SW1(config-if)#lldp transmit –
SW1(config-if)#lldp receive
C. SW1(contig)#lldp enable –
SW1(config)#interface gigabitethernet1/0/1
SW1(config-if)#lldp run
D. SW1(config)#no cdp enable –
SW1(config)#interface gigabitethernet1/0/1
SW1(config-if)#cdp run
Selected Answer: B
Question #: 845
Topic #: 1
Refer to the exhibit. Routers R1, R2, and R3 use a protocol to identify the neighbors’ IP addresses, hardware platforms, and software versions. A network engineer must configure R2 to avoid sharing any neighbor information with R3, and maintain its relationship with R1. What action meets this requirement?
A. Configure the no lldp receive command on g0/1.
B. Configure the no cdp run command globally.
C. Configure the no cdp enable command on g0/2.
D. Configure the no lldp run command globally.
Selected Answer: C
Question #: 846
Topic #: 1
SIP-based Call Admission Control must be configured in the Cisco WLC GUI. SIP call-snooping ports are configured. Which two actions must be completed next? (Choose two.)
A. Set the QoS level to silver or greater for voice traffic.
B. Configure two different QoS roles for data and voice traffic.
C. Enable Media Session Snooping on the WLAN.
D. Set the QoS level to platinum for voice traffic.
E. Enable traffic shaping for the LAN interface of the WLC.
Selected Answer: CD
Question #: 847
Topic #: 1
Refer to the exhibit. A network administrator configures an interface on a new switch so that it connects to interface Gi1/0/1 on switch Cat9300-1. Which configuration must be applied to the new interface?
A. switchport mode trunk
switchport trunk native vlan 321
switchport trunk allowed vlan 100,200,300
B. switchport mode dynamic desirable
switchport trunk native vlan 321
switchport trunk allowed vian 100,200,300
C. switchport trunk encapsulation dot1q
switchport trunk native vlan 321
switchport trunk allowed vlan 100-300
D. switchport nonegotiate
switchport access vlan 321
switchport trunk allowed vlan except 2-1001
Selected Answer: A
Question #: 848
Topic #: 1
Which command enables HTTP access to the Cisco WLC?
A. config network telnet enable
B. config network secureweb enable
C. config certificate generate webadmin
D. config network webmode enable
Selected Answer: D
Question #: 849
Topic #: 1
Which port state processes BPDUs, but does not forward packets or update the address database in Rapid PVST+?
A. blocking
B. learning
C. listening
D. disabled
Selected Answer: A
Question #: 850
Topic #: 1
A switch is forwarding a frame out of all interfaces except the interface that received the frame. What is the technical term for this process?
A. ARP
B. CDP
C. flooding
D. multicast
Selected Answer: C
Question #: 851
Topic #: 1
Refer to the exhibit. Rapid PVST+ mode is on the same VLAN on each switch. Which switch becomes the root bridge and why?
A. SW4, because its priority is highest and its MAC address is lower
B. SW1, because its priority is the lowest and its MAC address is higher
C. SW2, because its MAC address is the highest
D. SW3, because its priority is the highest
Selected Answer: B
Question #: 852
Topic #: 1
Which EtherChannel mode must be configured when using LAG on a WLC?
A. on
B. passive
C. active
D. auto
Selected Answer: A
Question #: 853
Topic #: 1
DRAG DROP
–
Drag and drop the VLAN port modes from the left onto the descriptions on the right.
Suggestion Answer:
Question #: 854
Topic #: 1
Which switch concept is used to create separate broadcast domains?
A. STP
B. VTP
C. VLAN
D. CSMA/CD
Selected Answer: C
Question #: 855
Topic #: 1
How must a switch interface be configured when an AP is in FlexConnect mode?
A. access port
B. EtherChannel
C. PoE port
D. trunk port
Selected Answer: D
Question #: 856
Topic #: 1
What are two features of PortFast? (Choose two.)
A. Convergence is fast after a link failure.
B. STP loops are mitigated for uplinks to other switches.
C. Ports transition directly from the blocking state to the forwarding state.
D. Ports operate normally without receiving BPDUs.
E. Ports that connect to the backbone automatically detect indirect link failures.
Selected Answer: CD
Question #: 857
Topic #: 1
What is the root port in STP?
A. It is the port with the highest priority toward the root bridge.
B. It is the port on the root switch that leads to the designated port on another switch.
C. It is the port that is elected only when the root bridge has precisely one port on a single LAN segment.
D. It is the port on a switch with the lowest cost to reach the root bridge.
Selected Answer: D
Question #: 858
Topic #: 1
When a switch receives a frame from an unknown source MAC address, which action does the switch take with the frame?
A. It sends the frame to ports within the CAM table identified with an unknown source MAC address.
B. It floods the frame out all interfaces, including the interface it was received on.
C. It associates the source MAC address with the LAN port on which it was received and saves it to the MAC address table.
D. It attempts to send the frame back to the source to ensure that the source MAC address is still available for transmissions.
Selected Answer: C
Question #: 859
Topic #: 1
When the LAG configuration is updated on a Cisco WLC, which additional task must be performed when changes are complete?
A. Reboot the WLC.
B. Flush all MAC addresses from the WLC.
C. Re-enable the WLC interfaces.
D. Re-associate the WLC with the access point.
Selected Answer: A
Question #: 860
Topic #: 1
Refer to the exhibit. An engineer ts building a new Layer 2 LACP EtherChannel between SW1 and SW2, and they executed the given show commands to verify the work. Which additional task must be performed so that the switches successfully bundle the second member in the LACP port-channel?
A. Configure the switchport trunk allowed vlan 300 command on SW1 port-channel 1.
B. Configure the switchport trunk allowed vlan add 300 command on interface Fa0/2 on SW2.
C. Configure the switchport trunk allowed vlan add 300 command on SW1 port-channel 1.
D. Configure the switchport trunk allowed vlan 300 command on interface Fa0/2 on SW1.
Selected Answer: C