CCNA 2 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2019 - 100% Full
CCNA 2 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2019 - 100% Full
4 / 5 ( 16 votes )
New Version:
How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the
question to find that question/answer.
NOTE: If you have the new question on this test, please comment Question and
Multiple-Choice list in form below this article. We will update answers for you in
the shortest time. Thank you! We truly value your contribution to the website.
BGP*
EIGRP
OSPF
RIP
BGP is a protocol developed to interconnect different levels of ISPs as well as ISPs and
some of their larger private clients.
OSPF
RIP*
EIGRP
IS-IS
The RIP protocol was created with a metric that does not support larger networks. Other
routing protocols, including OSPF, EIGRP, and IS-IS, scale well and accommodate growth
and larger networks.
discover hosts
update and maintain routing tables*
propagate host default gateways
network discovery*
assign IP addressing
1/24
4. When would it be more beneficial to use a dynamic routing protocol instead of
static routing?
Dynamic routing protocols consume more router resources, are suitable for larger
networks, and are more useful on networks that are growing and changing.
Dynamic routing protocols are viewed as less secure than static routing because they
commonly forward routing information on the same links that data traffic is crossing.
The network command is used to advertise the directly connected networks of a router.
It enables RIP on the interfaces that belong to the specified network.
2/24
allows a routing protocol to forward updates out an interface that is missing its IP
address
allows a router to send routing updates on an interface but not receive updates via
that interface
allows an interface to remain up without receiving keepalives
allows interfaces to share IP addresses
allows a router to receive routing updates on an interface but not send
updates via that interface*
Directly connected networks are identified with a C and are automatically created
whenever an interface is configured with an IP address and activated.
10. Refer to the exhibit. Which two types of routes could be used to describe the
192.168.200.0/30 route? (Choose two.)
ultimate route*
level 1 parent route
level 1 network route
level 2 child route*
supernet route
A level 2 child route is a route that has a network with a mask that is greater than the
classful equivalent. An ultimate route is a route that uses a next-hop IP address or exit
interface to forward traffic.
3/24
11. What occurs next in the router lookup process after a router identifies a
destination IP address and locates a matching level 1 parent route?
When a router locates a parent route that matches the destination IP address of a
packet, the router will then examine the level 2 child routes contained within it.
12. Which route would be used to forward a packet with a source IP address of
192.168.10.1 and a destination IP address of 10.1.1.1?
Even though OSPF has a higher administrative distance value (less trustworthy), the best
match is the route in the routing table that has the most number of far left matching
bits.
13. Which two requirements are used to determine if a route can be considered as
an ultimate route in a router’s routing table? (Choose two.)
contain subnets
be a default route
contain an exit interface*
be a classful network entry
contain a next-hop IP address*
An ultimate route is a routing table entry that contains either a next-hop IP address
(another path) or an exit interface, or both. This means that directly connected and link-
local routes are ultimate routes. A default route is a level 1 ultimate route, but not all
ultimate routes are default routes. Routing table entries that are subnetted are level 1
parent routes but do not meet either of the two requirements to be ultimate routes.
Ultimate routes do not have to be classful network entries.
4/24
By default, dynamic routing protocols forward messages across a network without
authenticating the receiver or originator of traffic. Static routes increase in configuration
complexity as the network grows larger and are more suitable for smaller networks.
Static routes also require manual intervention when a network topology changes or links
become disabled.
15. Which two statements are true regarding classless routing protocols? (Choose
two.)
16. Refer to the exhibit. Based on the partial output from the show ip route
command, what two facts can be determined about the RIP routing protocol?
(Choose two.)
The router learned, via RIP, that 172.16.0.0 is variably subnetted, and that there are two
subnet and mask entries for that network. This means that RIP version 2 is running on
both routers and that the command no auto-summary has been applied on the
neighbor router. RIPv2 has an administrative distance of 120 and this router will
advertise all connected networks to the neighbor via 192.168.1.1.
5/24
The interface of the 192.168.10.0 network is sending version 1 and version 2
updates.
The interface of the 192.168.10.0 network is receiving version 1 and version 2
updates.
The interface of the 192.168.10.0 network is sending only version 2 updates.*
The interface of the 192.168.10.0 network is sending RIP hello messages.
The command being entered by the engineer will cause RIPv2 to activate on the interface
for the 192.168.10.0 network. If RIPv1 is configured, the router will send only version 1
updates, but will listen for both version 1 and version 2 updates. If RIPv2 is configured,
the router will send and listen to only version 2 updates.
18. A destination route in the routing table is indicated with a code D. Which kind
of route entry is this?
a static route
a route used as the default gateway
a network directly connected to a router interface
a route dynamically learned through the EIGRP routing protocol*
Routes in a routing table are manually created or dynamically learned. Letter D indicates
that the route was learned dynamically through the EIGRP routing protocol.
19. Refer to the exhibit. Which interface will be the exit interface to forward a data
packet with the destination IP address 172.16.0.66?
Serial0/0/0
Serial0/0/1*
GigabitEthernet0/0
6/24
GigabitEthernet0/1
20. Which type of route will require a router to perform a recursive lookup?
an ultimate route that is using a next hop IP address on a router that is not
using CEF*
a level 2 child route that is using an exit interface on a router that is not using CEF
a level 1 network route that is using a next hop IP address on a router that is using
CEF
a parent route on a router that is using CEF
When Cisco Express Forwarding (CEF) is not being used on a router, a recursive lookup
must be performed when a route using a next-hop IP address is selected as the best
pathway to forward data.
21. Which route is the best match for a packet entering a router with a destination
address of 10.16.0.2?
Before the administrative distance of a route is compared, the route with the most
specific best match is utilized. The 192.168.14.0/26 network contains the best match to
the destination IP address of 192.168.14.20 and thus the 192.168.14.0/26 RIP route is
utilized over the EIGRP and OSFP routes, regardless of administrative distance.
23. What is different between IPv6 routing table entries compared to IPv4 routing
table entries?
IPv6 routing tables include local route entries which IPv4 routing tables do not.
By design IPv6 is classless so all routes are effectively level 1 ultimate
routes.*
7/24
The selection of IPv6 routes is based on the shortest matching prefix, unlike IPv4
route selection which is based on the longest matching prefix.
IPv6 does not use static routes to populate the routing table as used in IPv4.
Routers running IOS release 15 have link local routing table entries for both IPv4 and
IPv6. The selection of both IPv6 routes and IPv4 routes is based on the longest matching
prefix. The routing tables of both IPv6 and IPv4 use directly connected interfaces, static
routes, and dynamically learned routes.
24. Match the dynamic routing protocol component to the characteristic. (Not all
options are used.)
data structures
tables or databases that are stored in RAM*
routing protocol messages
exchanges routing information and maintains accurate information about
networks*
algorithm
a finite list of steps used to determine the best path*
8/24
The three components of dynamic routing protocols include:
Data structures
Routing protocol messages
Algorithm
25. Match the characteristic to the corresponding type of routing. (Not all options
are used.)
Both static and dynamic routing could be used when more than one router is involved.
Dynamic routing is when a routing protocol is used. Static routing is when every remote
route is entered manually by an administrator into every router in the network topology.
Older Version:
26. Which three statements accurately describe VLAN types? (Choose three).
9/24
A management VLAN is any VLAN that is configured to access management
features of the switch.*
A data VLAN is used to carry VLAN management data and user-generated traffic.
After the initial boot of an unconfigured switch, all ports are members of the
default VLAN. *
An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and
untagged traffic.*
Voice VLANs are used to support user phone and e-mail traffic on a network.
VLAN 1 is always used as the management VLAN.
27. Which type of VLAN is used to designate which traffic is untagged when
crossing a trunk port?
data
default
native*
management
28. What are three primary benefits of using VLANs? (Choose three.)
security*
a reduction in the number of trunk links
cost reduction *
end user satisfaction
improved IT staff efficiency*
no required configuration
29. Refer to the exhibit. A frame is traveling between PC-A and PC-B through the
switch. Which statement is true concerning VLAN tagging of the frame?
30. Which command displays the encapsulation type, the voice VLAN ID, and the
access mode VLAN for the Fa0/1 interface?
31. What must the network administrator do to remove Fast Ethernet port fa0/1
from VLAN 2 and assign it to VLAN 3?
Enter the no vlan 2 and the vlan 3 commands in global configuration mode.
Enter the switchport access vlan 3 command in interface configuration
mode.*
Enter the switchport trunk native vlan 3 command in interface configuration mode.
Enter the no shutdown in interface configuration mode to return it to the default
configuration and then configure the port for VLAN 3.
32. A Cisco Catalyst switch has been added to support the use of multiple VLANs as
part of an enterprise network. The network technician finds it necessary to clear
all VLAN information from the switch in order to incorporate a new network
design. What should the technician do to accomplish this task?
33. Which two characteristics match extended range VLANs? (Choose two.)
34. What happens to switch ports after the VLAN to which they are assigned is
deleted?
35. A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across
trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30
command on Fa0/5?
36. What VLANs are allowed across a trunk when the range of allowed VLANs is set
to the default value?
37. Which command should the network administrator implement to prevent the
transfer of DTP frames between a Cisco switch and a non-Cisco switch?
38. Under which two occasions should an administrator disable DTP while
managing a local area network? (Choose two.)
39. In a basic VLAN hopping attack, which switch feature do attackers take
advantage of?
12/24
40. Which two Layer 2 security best practices would help prevent VLAN hopping
attacks? (Choose two.)
Change the native VLAN number to one that is distinct from all user VLANs
and is not VLAN 1.*
Change the management VLAN to a distinct VLAN that is not accessible by regular
users.
Statically configure all ports that connect to end-user host devices to be in trunk
mode.
Disable DTP autonegotiation on end-user ports.*
Use SSH for all remote management access.
41. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to
another switch. All other ports are unused. Which security best practice did the
administrator forget to configure?
Disable autonegotiation and set ports to either static access or static trunk.
Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a
VLAN number that is not VLAN 1.
Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on
the network.
All user ports are associated with VLANs distinct from VLAN 1 and distinct
from the ‘black-hole’ VLAN.*
13/24
42. A network administrator is determining the best placement of VLAN trunk
links. Which two types of point-to-point connections utilize VLAN trunking?
(Choose two.)
43. What is the effect of issuing a switchport access vlan 20 command on the Fa0/18
port of a switch that does not have this VLAN in the VLAN database?
44. Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport
access vlan 30 is entered on the Fa0/11 interface, what will happen?
delete vlan.dat
delete flash:vlan.dat
no vlan 20 *
no switchport access vlan 20
46. Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to
communicate with PC-B. What is the problem?
14/24
CCNA 2 Chapter 3 Exam Answer 002 (v5.02, 2015)
47. What happens to a port that is associated with VLAN 10 when the
administrator deletes VLAN 10 from the switch?
48. In a basic VLAN hopping attack, which switch feature do attackers take
advantage of?
49. Which two Layer 2 security best practices would help prevent VLAN hopping
attacks? (Choose two.)
15/24
Change the native VLAN number to one that is distinct from all user VLANs
and is not VLAN 1.*
Change the management VLAN to a distinct VLAN that is not accessible by regular
users.
Statically configure all ports that connect to end-user host devices to be in trunk
mode.
Disable DTP autonegotiation on end-user ports.*
Use SSH for all remote management access.
50. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to
another switch. All other ports are unused. Which security best practice did the
administrator forget to configure?
Disable autonegotiation and set ports to either static access or static trunk.
Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a
VLAN number that is not VLAN 1.
Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on
the network.
All user ports are associated with VLANs distinct from VLAN 1 and distinct
from the ‘black-hole’ VLAN.*
52. What happens to a port that is associated with VLAN 10 when the
administrator deletes VLAN 10 from the switch?
53. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to
another switch. All other ports are unused. Which security best practice did the
administrator forget to configure?
Configure all unused ports to a ‘black-hole’ VLAN that is not used for anything on
the network.
Disable autonegotiation and set ports to either static access or static trunk.
Change the native VLAN to a fixed VLAN that is distinct from all user VLANs and to a
VLAN number that is not VLAN 1.
17/24
All user ports are associated with VLANs distinct from VLAN 1 and distinct
from the ‘black-hole’ VLAN.*
55. What is the effect of issuing a switchport access vlan 20 command on the
Fa0/18 port of a switch that does not have this VLAN in the VLAN database?
– not scored –
dynamic auto
nonegotiate
dynamic desirable
trunk
18/24
57. Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport
access vlan 30 is entered on the Fa0/11 interface, what will happen?
58. Which two Layer 2 security best practices would help prevent VLAN hopping
attacks? (Choose two.)
59. In a basic VLAN hopping attack, which switch feature do attackers take
advantage of?
60. Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to
communicate with PC-B. What is the problem?
19/24
The native VLAN is being pruned from the link.
The VLAN that is used by PC-A is not in the list of allowed VLANs on the
trunk.*
The trunk has been configured with the switchport nonegotiate command.
The native VLAN should be VLAN 60.
61. Under which two occasions should an administrator disable DTP while
managing a local area network? (Choose two.)
62. Open the PT Activity. Perform the tasks in the activity instructions and then
answer the question.
20/24
Which PCs will receive the broadcast sent by PC-C?
PC-D, PC-E*
PC-A, PC-B, PC-D, PC-E
PC-A, PC-B
PC-A, PC-B, PC-D, PC-E, PC-F
PC-A, PC-B, PC-E
63. Which two statements are true about VLAN implementation? (Choose two.)
64. Which switch feature ensures that no unicast, multicast, or broadcast traffic is
passed between ports that are configured with this feature?
21/24
66. Which combination of DTP modes set on adjacent Cisco switches will cause the
link to become an access link instead of a trunk link?
67. An administrator has determined that the traffic from a switch that
corresponds to a VLAN is not being received on another switch over a trunk link.
What could be the problem?
68. What is the default DTP mode on Cisco 2960 and 3560 switches?
trunk
dynamic auto*
access
dynamic desirable
22/24
Interface FastEthernet 0/1 is configured as dynamic auto by the administrator.
70. Match the IEEE 802.1Q standard VLAN tag field in the description. (not all
options are used)
71. Which two modes does Cisco recommend when configuring a particular switch
port? (Choose two.)
trunk*
IEEE 802.1Q
access*
Gigabit Ethernet
FastEthernet
ISL
23/24
Download PDF File below:
like
tweet
share
follow us
error
share
or wait 352s
24/24