200-301: Cisco Certified Network Associate (CCNA) Part 2
Question #: 61
Topic #: 1
Which two options are the best reasons to use an IPV4 private IP space? (Choose two.)
A. to enable intra-enterprise communication
B. to implement NAT
C. to connect applications
D. to conserve global address space
E. to manage routing overhead
Selected Answer: AD
Question #: 62
Topic #: 1
Refer to the exhibit. When PC1 sends a packet to PC2, the packet has which source and destination IP address when it arrives at interface Gi0/0 on router R2?
A. source 192.168.10.10 and destination 10.10.2.2
B. source 192.168.20.10 and destination 192.168.20.1
C. source 192.168.10.10 and destination 192.168.20.10
D. source 10.10.1.1 and destination 10.10.2.2
Selected Answer: C
Question #: 63
Topic #: 1
What is the same for both copper and fiber interfaces when using SFP modules?
A. They support an inline optical attenuator to enhance signal strength
B. They accommodate single-mode and multi-mode in a single module
C. They provide minimal interruption to services by being hot-swappable
D. They offer reliable bandwidth up to 100 Mbps in half duplex mode
Selected Answer: C
Question #: 64
Topic #: 1
What are two functions of a server on a network? (Choose two.)
A. handles requests from multiple workstations at the same time
B. achieves redundancy by exclusively using virtual server clustering
C. housed solely in a data center that is dedicated to a single client achieves redundancy by exclusively using virtual server clustering
D. runs the same operating system in order to communicate with other servers
E. runs applications that send and retrieve data for workstations that make requests
Selected Answer: AE
Question #: 65
Topic #: 1
Which function is performed by the collapsed core layer in a two-tier architecture?
A. enforcing routing policies
B. marking interesting traffic for data policies
C. applying security policies
D. attaching users to the edge of the network
Selected Answer: A
Question #: 66
Topic #: 1
What is the primary function of a Layer 3 device?
A. to transmit wireless traffic between hosts
B. to analyze traffic and drop unauthorized traffic from the Internet
C. to forward traffic within the same broadcast domain
D. to pass traffic between different networks
Selected Answer: D
Question #: 67
Topic #: 1
Which two functions are performed by the core layer in a three-tier architecture? (Choose two.)
A. Provide uninterrupted forwarding service
B. Inspect packets for malicious activity
C. Ensure timely data transfer between layers
D. Provide direct connectivity for end user devices
E. Police traffic that is sent to the edge of the network
Selected Answer: AC
Question #: 68
Topic #: 1
What is a recommended approach to avoid co-channel congestion while installing access points that use the 2.4 GHz frequency?
A. different nonoverlapping channels
B. one overlapping channel
C. one nonoverlapping channel
D. different overlapping channels
Selected Answer: C
Question #: 69
Topic #: 1
A manager asks a network engineer to advise which cloud service models are used so employees do not have to waste their time installing, managing, and updating software that is only used occasionally. Which cloud service model does the engineer recommend?
A. infrastructure-as-a-service
B. platform-as-a-service
C. business process as service to support different types of service
D. software-as-a-service
Selected Answer: D
Question #: 70
Topic #: 1
What are two functions of a Layer 2 switch? (Choose two.)
A. acts as a central point for association and authentication servers
B. selects the best route between networks on a WAN
C. moves packets within a VLAN
D. moves packets between different VLANs
E. makes forwarding decisions based on the MAC address of a packet
Selected Answer: CE
Question #: 71
Topic #: 1
DRAG DROP –
Drag and drop the TCP/IP protocols from the left onto their primary transmission protocols on the right.
Select and Place:
Suggestion Answer:
Question #: 72
Topic #: 1
An engineer observes high usage on the 2.4GHz channels and lower usage on the 5GHz channels. What must be configured to allow clients to preferentially use
5GHz access points?
A. Client Band Select
B. Re-Anchor Roamed Clients
C. OEAP Spilt Tunnel
D. 11ac MU-MIMO
Selected Answer: A
Question #: 73
Topic #: 1
Which networking function occurs on the data plane?
A. processing inbound SSH management traffic
B. sending and receiving OSPF Hello packets
C. facilitates spanning-tree elections
D. forwarding remote client/server traffic
Selected Answer: D
Question #: 74
Topic #: 1
Under which condition is TCP preferred over UDP?
A. UDP is used when low latency is optimal, and TCP is used when latency is tolerable.
B. TCP is used when dropped data is more acceptable, and UDP is used when data is accepted out-of-order.
C. TCP is used when data reliability is critical, and UDP is used when missing packets are acceptable.
D. UDP is used when data is highly interactive, and TCP is used when data is time-sensitive.
Selected Answer: C
Question #: 75
Topic #: 1
Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent connectivity issue?
A. Interface errors are incrementing.
B. High usage is causing high latency.
C. An incorrect SFP media type was used at SiteA.
D. The sites were connected with the wrong cable type.
Selected Answer: D
Question #: 76
Topic #: 1
A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied, the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?
A. ipv6 address 2001::db8:0000::500:a:400F:583B
B. ipv6 address 2001:db8:0::500:a:4F:583B
C. ipv6 address 2001:db8::500:a:400F:583B
D. ipv6 address 2001:0db8::5:a:4F:583B
Selected Answer: C
Question #: 77
Topic #: 1
What is a network appliance that checks the state of a packet to determine whether the packet is legitimate?
A. Layer 2 switch
B. LAN controller
C. load balancer
D. firewall
Selected Answer: D
Question #: 78
Topic #: 1
What is a role of access points in an enterprise network?
A. integrate with SNMP in preventing DDoS attacks
B. serve as a first line of defense in an enterprise network
C. connect wireless devices to a wired network
D. support secure user logins to devices on the network
Selected Answer: C
Question #: 79
Topic #: 1
An implementer is preparing hardware for virtualization to create virtual machines on a host. What is needed to provide communication between hardware and virtual machines?
A. router
B. hypervisor
C. switch
D. straight cable
Selected Answer: B
Question #: 80
Topic #: 1
How does a Cisco Unified Wireless Network respond to Wi-Fi channel overlap?
A. It allows the administrator to assign the channels on a per-device or per-interface basis.
B. It segregates devices from different manufactures onto different channels.
C. It analyzes client load and background noise and dynamically assigns a channel.
D. It alternates automatically between 2.4 GHz and 5 GHz on adjacent access points.
Selected Answer: C
Question #: 81
Topic #: 1
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
A. The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.
B. The ISP requires the new subnet to be advertised to the Internet for web services.
C. There is limited unique address space, and traffic on the new subnet will stay local within the organization.
D. Traffic on the subnet must traverse a site-to-site VPN to an outside organization.
Selected Answer: C
Question #: 82
Topic #: 1
DRAG DROP –
Drag and drop the characteristics of network architectures from the left onto the type of architecture on the right.
Select and Place:
Suggestion Answer:
Question #: 83
Topic #: 1
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?
A. data
B. management
C. control
D. action
Selected Answer: B
Question #: 84
Topic #: 1
What is the difference in data transmission delivery and reliability between TCP and UDP?
A. TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to ensure applications receive the data on the remote end.
B. TCP requires the connection to be established before transmitting data. UDP transmits data at a higher rate without ensuring packet delivery.
C. UDP sets up a connection between both devices before transmitting data. TCP uses the three-way handshake to transmit data with a reliable connection.
D. UDP is used for multicast and broadcast communication. TCP is used for unicast communication and transmits data at a higher rate with error checking.
Selected Answer: B
Question #: 85
Topic #: 1
Refer to the exhibit. When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A, verifying the IP addresses, and forwarding the packet to PC-B?
A. router
B. Layer 2 switch
C. load balancer
D. firewall
Selected Answer: A
Question #: 86
Topic #: 1
What is the maximum bandwidth of a T1 point-to-point connection?
A. 1.544 Mbps
B. 2.048 Mbps
C. 34.368 Mbps
D. 43.7 Mbps
Selected Answer: A
Question #: 87
Topic #: 1
What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)
A. Both support speeds up to 10 Gigabit.
B. Both support speeds of at least 1 Gigabit.
C. Both support runs of up to 55 meters.
D. Both support runs of up to 100 meters.
E. Both operate at a frequency of 500 MHz.
Selected Answer: BD
Question #: 88
Topic #: 1
What is a characteristic of cloud-based network topology?
A. onsite network services are provided with physical Layer 2 and Layer 3 components
B. wireless connections provide the sole access method to services
C. physical workstations are configured to share resources
D. services are provided by a public, private, or hybrid deployment
Selected Answer: D
Question #: 89
Topic #: 1
Which network action occurs within the data plane?
A. reply to an incoming ICMP echo request
B. make a configuration change from an incoming NETCONF RPC
C. run routing protocols (OSPF, EIGRP, RIP, BGP)
D. compare the destination IP address to the IP routing table
Selected Answer: D
Question #: 90
Topic #: 1
Refer to the exhibit. R1 has just received a packet from host A that is destined to host B. Which route in the routing table is used by R1 to reach host B?
A. 10.10.13.0/25 [1/0] via 10.10.10.2
B. 10.10.13.0/25 [108/0] via 10.10.10.10
C. 10.10.13.0/25 [110/2] via 10.10.10.6
D. 10.10.13.0/25 [110/2] via 10.10.10.2
Selected Answer: B
Question #: 91
Topic #: 1
Which two network actions occur within the data plane? (Choose two.)
A. Run routing protocols.
B. Make a configuration change from an incoming NETCONF RPC.
C. Add or remove an 802.1Q trunking header.
D. Match the destination MAC address to the MAC address table.
E. Reply to an incoming ICMP echo request.
Selected Answer: CD
Question #: 92
Topic #: 1
What are network endpoints?
A. support inter-VLAN connectivity
B. a threat to the network if they are compromised
C. act as routers to connect a user to the service provider network
D. enforce policies for campus-wide traffic going to the Internet
Selected Answer: B
Question #: 93
Topic #: 1
Refer to the exhibit. The link between PC1 and the switch is up, but it is performing poorly. Which interface condition is causing the performance problem?
A. There is an issue with the fiber on the switch interface.
B. There is a duplex mismatch on the interface.
C. There is an interface type mismatch.
D. There is a speed mismatch on the interface.
Selected Answer: A
Question #: 94
Topic #: 1
Why was the RFC 1918 address space defined?
A. conserve public IPv4 addressing
B. support the NAT protocol
C. preserve public IPv6 address space
D. reduce instances of overlapping IP addresses
Selected Answer: A
Question #: 95
Topic #: 1
DRAG DROP –
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Select and Place:
Suggestion Answer:
Question #: 96
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.
Select and Place:
Suggestion Answer:
Question #: 97
Topic #: 1
Which type of organization should use a collapsed-core architecture?
A. small and needs to reduce networking costs
B. large and must minimize downtime when hardware fails
C. large and requires a flexible, scalable network design
D. currently small but is expected to grow dramatically in the near future
Selected Answer: A
Question #: 98
Topic #: 1
A network administrator is setting up a new IPv6 network using the 64-bit address 2001:0EB8:00C1:2200:0001:0000:0000:0331/64. To simplify the configuration, the administrator has decided to compress the address. Which IP address must the administrator configure?
A. ipv6 address 2001:EB8:C1:22:1::331/64
B. ipv6 address 21:EB8:C1:2200:1::331/64
C. ipv6 address 2001:EB8:C1:2200:1:0000:331/64
D. ipv6 address 2001:EB8:C1:2200:1::331/64
Selected Answer: D
Question #: 99
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 addresses from the left onto the corresponding address types on the right.
Select and Place:
Suggestion Answer:
Question #: 100
Topic #: 1
What is an appropriate use for private IPv4 addressing?
A. to allow hosts inside to communicate in both directions with hosts outside the organization
B. on internal hosts that stream data solely to external resources
C. on the public-facing interface of a firewall
D. on hosts that communicate only with other internal hosts
Selected Answer: D
Question #: 101
Topic #: 1
Refer to the exhibit. An engineer is configuring the HO router. Which IPv6 address configuration must be applied to the router fa0/1 interface for the router to assign a unique 64-bit IPv6 address to itself?
A. ipv6 address 2001:DB8:0:1:FFFF:C601:420F:7/64
B. ipv6 address 2001:DB8:0:1:FE80:C601:420F:7/64
C. ipv6 address 2001:DB8:0:1:C601:42FF:FE0F:7/64
D. ipv6 address 2001:DB8:0:1:C601:42FF:800F:7/64
Selected Answer: C
Question #: 102
Topic #: 1
What is a similarity between 1000BASE-LX and 1000BASE-T standards?
A. Both use the same data-link header and trailer formats.
B. Both cable types support RJ-45 connectors.
C. Both support up to 550 meters between nodes.
D. Both cable types support LR connectors.
Selected Answer: A
Question #: 103
Topic #: 1
Refer to the exhibit. The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?
A. 192.168.1.253
B. 192.168.1.100
C. 192.168.1.226
D. 192.168.1.254
Selected Answer: A
Question #: 104
Topic #: 1
Which function forwards frames to ports that have a matching destination MAC address?
A. frame flooding
B. frame filtering
C. frame pushing
D. frame switching
Selected Answer: D
Question #: 105
Topic #: 1
Which type of IPv6 address is similar to a unicast address but is assigned to multiple devices on the same network at the same time?
A. global unicast address
B. link-local address
C. anycast address
D. multicast address
Selected Answer: C
Question #: 106
Topic #: 1
What is a characteristic of private IPv4 addressing?
A. composed of up to 65,536 available addresses
B. issued by IANA in conjunction with an autonomous system number
C. used without tracking or registration
D. traverse the Internet when an outbound ACL is applied
Selected Answer: C
Question #: 107
Topic #: 1
What is a function of an endpoint on a network?
A. provides wireless services to users in a building
B. connects server and client device to a network
C. allows users to record data and transmit to a file server
D. forwards traffic between VLANs on a network
Selected Answer: B
Question #: 108
Topic #: 1
What is the function of a controller in controller-based networking?
A. It serves as the centralized management point of an SDN architecture
B. It is a pair of core routers that maintain all routing decisions for a campus
C. It centralizes the data plane for the network
D. It is the card on a core router that maintains all routing decisions for a campus.
Selected Answer: A
Question #: 109
Topic #: 1
Refer to the exhibit. Each router must be configured with the last usable IP address in the subnet. Which configuration fulfills this requirement?
A. R7# interface FastEthernet1/0 ip address 10.88.31.127 255.255.255.192 R8# interface FastEthernet0/0 ip address 10.19.63.95 255.255.255.240 R9# interface FastEthernet1/1 ip address 10.23.98.159 255.255.255.224
B. R7# interface FastEthernet1/0 ip address 10.88.31.126 255.255.255.240 R8# interface FastEthernet0/0 ip address 10.19.63.94 255.255.255.192 R9# interface FastEthernet1/1 ip address 10.23.98.158 255.255.255.248
C. R7# interface FastEthernet1/0 ip address 10.88.31.127 255.255.255.240 R8# interface FastEthernet0/0 ip address 10.19.63.95 255.255.255.192 R9# interface FastEthernet1/1 ip address 10.23.98.159 255.255.255.248
D. R7# interface FastEthernet1/0 ip address 10.88.31.126 255.255.255.192 R8# interface FastEthernet0/0 ip address 10.19.63.94 255.255.255.240 R9# interface FastEthernet1/1 ip address 10.23.98.158 255.255.255.224
Selected Answer: D
Question #: 110
Topic #: 1
How do TCP and UDP fit into a query-responsible model?
A. TCP avoids using sequencing and UDP avoids using acknowledgments
B. TCP establishes a connection prior to sending data, and UDP sends immediately
C. TCP encourages out-of-order packet delivery, and UDP prevents re-ordering
D. TCP uses error detection for packets, and UDP uses error recovery.
Selected Answer: B
Question #: 111
Topic #: 1
What provides centralized control of authentication and roaming in an enterprise network?
A. a lightweight access point
B. a wireless LAN controller
C. a firewall
D. a LAN switch
Selected Answer: B
Question #: 112
Topic #: 1
Which set of 2 4 GHz nonoverlapping wireless channels is standard in the United States?
A. channels 1, 6, 11, and 14
B. channels 2, 7, 9, and 11
C. channels 2, 7, and 11
D. channels 1, 6, and 11
Selected Answer: D
Question #: 113
Topic #: 1
A network engineer is installing an IPv6-only capable device. The client has requested that the device IP address be reachable only from the internal network.
Which type of IPv6 address must the engineer assign?
A. IPv4-compatible IPv6 address
B. unique local address
C. link-local address
D. aggregatable global address
Selected Answer: B
Question #: 114
Topic #: 1
What is a requirement for nonoverlapping Wi-Fi channels?
A. different security settings
B. discontinuous frequency ranges
C. unique SSIDs
D. different transmission speeds
Selected Answer: B
Question #: 115
Topic #: 1
A network engineer must implement an IPv6 configuration on the vlan 2000 interface to create a routable locally-unique unicast address that is blocked from being advertised to the internet. Which configuration must the engineer apply?
A. interface vlan 2000 ipv6 address ff00:0000:aaaa::1234:2343/64
B. interface vlan 2000 ipv6 address fd00::1234:2343/64
C. interface vlan 2000 ipv6 address fe80:0000:aaaa::1234:2343/64
D. interface vlan 2000 ipv6 address fc00:0000:aaaa::a15d:1234:2343:8aca/64
Selected Answer: B
Question #: 116
Topic #: 1
What are two characteristics of an SSID? (Choose two.)
A. It uniquely identifies a client in a WLAN.
B. It is at most 32 characters long
C. It uniquely identifies an access point in a WLAN
D. It provides secured access to a WLAN.
E. It can be hidden or broadcast in a WLAN.
Selected Answer: BE
Question #: 117
Topic #: 1
When a switch receives a frame for a known destination MAC address, how is the frame handled?
A. flooded to all ports except the one from which it originated
B. forwarded to the first available port
C. sent to the port identified for the known MAC address
D. broadcast to all ports
Selected Answer: C
Question #: 118
Topic #: 1
DRAG DROP –
Drag and drop the IPv6 address details from the left onto the corresponding types on the right.
Select and Place:
Suggestion Answer:
Question #: 119
Topic #: 1
What is the collapsed layer in collapsed core architectures?
A. Core and distribution
B. access and WAN
C. distribution and access
D. core and WAN
Selected Answer: A
Question #: 120
Topic #: 1
What is a characteristic of a SOHO network?
A. includes at least three tiers of devices to provide load balancing and redundancy
B. connects each switch to every other switch in the network
C. enables multiple users to share a single broadband connection
D. provides high throughput access for 1000 or more users
Selected Answer: C