CCNA3
CCNA3
ISDN
DSL
cable
dialup
13. A customer needs a metropolitan area WAN connection
that provides high-speed, dedicated bandwidth between two
sites. Which type of WAN connection would best fulfill this
need?
packet-switched network
Ethernet WAN
circuit-switched network
MPLS
14. A company has contracted with a network security firm to
help identify the vulnerabilities of the corporate network. The
firm sends a team to perform penetration tests to the company
network. Why would the team use debuggers?
to detect installed tools within files and directories
that provide threat actors remote access and control
over a computer or network
to reverse engineer binary files when writing exploits
and when analyzing malware
to obtain specially designed operating systems
preloaded with tools optimized for hacking
to detect any evidence of a hack or malware in a
computer or network
15. Consider the following output for an ACL that has been
applied to a router via the access-class in command. What can
a network administrator determine from the output that is
shown?
R1#
online collaboration
BYOD
virtualization
maintaining communication integrity
21. Refer to the exhibit. Which address or addresses represent
the inside global address?
192.168.0.100
10.1.1.2
any address in the 10.1.1.0 network
209.165.20.25
22. Which two IPsec protocols are used to provide data
integrity?
MD5
DH
AES
SHA
RSA
23. If an outside host does not have the Cisco AnyConnect
client preinstalled, how would the host gain access to the
client image?
The Cisco AnyConnect client is installed by default on
most major operating systems.
The host initiates a clientless VPN connection using a
compliant web browser to download the client.
The host initiates a clientless connection to a TFTP
server to download the client.
The host initiates a clientless connection to an FTP
server to download the client.
24. A company is considering updating the campus WAN
connection. Which two WAN options are examples of the
private WAN architecture? (Choose two.)
leased line
cable
digital subscriber line
Ethernet WAN
municipal Wi-Fi
AD
38. Which statement describes a characteristic of standard
IPv4 ACLs?
They filter traffic based on source IP addresses only.
They can be created with a number but not with a
name.
They are configured in the interface configuration
mode.
They can be configured to filter traffic based on both
source IP addresses and source ports.
39. Refer to the exhibit. R1 is configured for NAT as displayed.
What is wrong with the configuration?
782
74
128
65
50. What is one reason to use the ip ospf priority command
when the OSPF routing protocol is in use?
AD
nested values
key/value pairs
an object
an array
59. What are three components used in the query portion of a
typical RESTful API request? (Choose three.)
resources
protocol
API server
format
key
parameters
60. A user reports that when the corporate web page URL is
entered on a web browser, an error message indicates that the
page cannot be displayed. The help-desk technician asks the
user to enter the IP address of the web server to see if the
page can be displayed. Which troubleshooting method is being
used by the technician?
top-down
bottom-up
divide-and-conquer
substitution
61. Which protocol provides authentication, integrity, and
confidentiality services and is a type of VPN?
MD5
AES
IPsec
ESP
62. Which statement describes a characteristic of Cisco
Catalyst 2960 switches?
AD
Trust Boundary 4
Trust Boundary 3
Trust Boundary 1
Trust Boundary 2
flash memory
NVRAM?
RAM
ROM
a TFTP server?
76. Refer to the exhibit. Which data format is used to represent
the data for network automation applications?
AD
XML
YAML
HTML
JSON
77. What QoS step must occur before packets can be marked?
classifying
shaping
queuing
policing
traffic shaping
weighted random early detection
classification and marking
traffic policing
81. An ACL is applied inbound on a router interface. The ACL
consists of a single entry:
AD
Router(config-ext-nacl)# no 20
loading
established
full
two-way
93. Refer to the exhibit. If the switch reboots and all routers
have to re-establish OSPF adjacencies, which routers will
become the new DR and BDR?
Router R3 will become the DR and router R1 will
become the BDR.
Router R4 will become the DR and router R3 will
become the BDR.
Router R1 will become the DR and router R2 will
become the BDR.
Router R3 will become the DR and router R2 will
become the BDR.
Case 2:
AD
Where should the administrator place this ACL for the most
efficient use of network resources?
inbound on router A Fa0/0
outbound on router B Fa0/0
outbound on router A Fa0/1
inbound on router B Fa0/1
100. Which type of OSPFv2 packet is used to forward OSPF link
change information?
AD
link-state acknowledgment
link-state update
hello
database description
101. What protocol synchronizes with a private master clock or
with a publicly available server on the internet?
MPLS
CBWFQ
TFTP
NTP
i386046n1v2.gif
router ospf 1
network 192.168.10.0 area 0
router ospf 1
network 192.168.10.0
router ospf 1
network 192.168.10.64 255.255.255.192
network 192.168.10.192 255.255.255.252
router ospf 1
network 192.168.10.64 0.0.0.63 area 0
network 192.168.10.192 0.0.0.3 area 0
AD
Case 2:
AD
S4 and PC_2
PC_3 and AP_2
AP_2 and AP_1
PC_3 and PC_2
S1 and S4
109. Which set of access control entries would allow all users
on the 192.168.10.0/24 network to access a web server that is
located at 172.17.80.1, but would not allow them to use
Telnet?
access-list 103 deny tcp host 192.168.10.0 any eq 23
access-list 103 permit tcp host 192.168.10.1 eq 80
AD
AD
AD
AD
open
partner
public
private
134. Refer to the exhibit. Which data format is used to
represent the data for network automation applications?
XML
HTML
YAML
JSON
135. An ACL is applied inbound on a router interface. The ACL
consists of a single entry:
AD
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
137. What protocol is a vendor-neutral Layer 2 protocol that
advertises the identity and capabilities of the host device to
other connected network devices?
NTP
LLDP
SNMP
MPLS
138. Which type of VPN uses a hub-and-spoke configuration to
establish a full mesh topology?
MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
139. What is a characteristic of the REST API?
evolved into what became SOAP
used for exchanging XML structured information over
HTTP or SMTP
considered slow, complex, and rigid
most widely used API for web services
141. A student, doing a summer semester of study overseas,
has taken hundreds of pictures on a smartphone and wants to
back them up in case of loss. What service or technology would
support this requirement?
AD
Cisco ACI
cloud services
software defined networking
dedicated servers
SSL VPN
GRE over IPsec
dynamic multipoint VPN
IPsec virtual tunnel interface
148. What type of traffic is described as predictable and
smooth?
video
data
voice
149. Which queuing mechanism has no provision for prioritizing
or buffering but simply forwards packets in the order they
arrive?
FIFO
LLQ
CBWFQ
WFQ
150. Refer to the exhibit. A network administrator has
configured OSPFv2 on the two Cisco routers. The routers are
unable to form a neighbor adjacency. What should be done to
fix the problem on router R2?
AD
A.
R1(config)# interface GigabitEthernet0/0
R1(config-if)# ip access-group 5 out
B.
R1(config)# access-list 5 permit 10.0.54.0 0.0.1.255
C.
R1(config)# interface Serial0/0/0
R1(config-if)# ip access-group 5 in
D.
R1(config)# access-list 5 permit 10.0.70.0 0.0.0.127
AD
E.
R1(config)# access-list 5 permit any
159. A network administrator is writing a standard ACL that
will deny any traffic from the 172.16.0.0/16 network, but permit
all other traffic. Which two commands should be used? (Choose
two.)
Router(config)# access-list 95 deny 172.16.0.0
255.255.0.0
Router(config)# access-list 95 permit any
Router(config)# access-list 95 host 172.16.0.0
Router(config)# access-list 95 deny 172.16.0.0
0.0.255.255
Router(config)# access-list 95 172.16.0.0
255.255.255.255
Router(config)# access-list 95 deny any
TFTP
SYSLOG
NTP
MPLS
162. Refer to the exhibit. If no router ID was manually
configured, what would router Branch1 use as its OSPF router
ID?
10.0.0.1
10.1.0.1
192.168.1.100
209.165.201.1
163. Match the HTTP method with the RESTful operation.
video
voice
data
166. Match the functions to the corresponding layers. (Not all
options are used.)
R1 S0/0/0 outbound
R2 G0/0 outbound
R2 S0/0/1 outbound
R1 S0/0/0 inbound
R2 G0/1 inbound
171. Two OSPF-enabled routers are connected over a point-to-
point link. During the ExStart state, which router will be chosen
as the first one to send DBD packets?
the router with the highest router ID
the router with the lowest IP address on the
connecting interface
the router with the highest IP address on the
connecting interface
the router with the lowest router ID
show ip protocols
show ip ospf neighbor
show running-configuration
show ip ospf interface
show ip route ospf
177. Which type of VPN involves the forwarding of traffic over
the backbone through the use of labels distributed among core
routers?
MPLS VPN
GRE over IPsec
IPsec virtual tunnel interface
dynamic multipoint VPN
178. Which type of VPN involves a nonsecure tunneling
protocol being encapsulated by IPsec?
SSL VPN
dynamic multipoint VPN
GRE over IPsec
IPsec virtual tunnel interface
179. A company has contracted with a network security firm to
help identify the vulnerabilities of the corporate network. The
firm sends a team to perform penetration tests to the company
network. Why would the team use hacking operation systems?
to detect any evidence of a hack or malware in a
computer or network
to obtain specially designed operating systems
preloaded with tools optimized for hacking
to encode data, using algorithm schemes, to prevent
unauthorized access to the encrypted data
to reverse engineer binary files when writing exploits
and when analyzing malware
180. What command would be used as part of configuring NAT
or PAT to identify an interface as part of the external global
network?
AD
ip pat inside
access-list 10 permit 172.19.89.0 0.0.0.255
ip nat inside
ip nat outside
181. To avoid purchasing new hardware, a company wants to
take advantage of idle system resources and consolidate the
number of servers while allowing for multiple operating
systems on a single hardware platform. What service or
technology would support this requirement?
data center
cloud services
virtualization
dedicated servers
182. Which type of VPN routes packets through virtual tunnel
interfaces for encryption and forwarding?
MPLS VPN
IPsec virtual tunnel interface
dynamic multipoint VPN
GRE over IPsec
183. Which step in the link-state routing process is described
by a router flooding link-state and cost information about each
directly connected link?
building the topology table
selecting the router ID
exchanging link-state advertisements
injecting the default route
184. What type of traffic is described as using either TCP or
UDP depending on the need for error recovery?
AD
video
voice
data
185. Refer to the exhibit. The company CEO demands that one
ACL be created to permit email traffic to the internet and deny
FTP access. What is the best ACL type and placement to use in
this situation?
permitted
denied
192. What protocol allows the manager to poll agents to
access information from the agent MIB?
CBWFQ
SYSLOG
TFTP
SNMP
193. Match each component of a WAN connection to its
description. (Not all options are used.)
Case 2:
voice
video
data
195. What term describes adding a value to the packet header,
as close to the source as possible, so that the packet matches
a defined policy?
policing
traffic marking
weighted random early detection (WRED)
traffic shaping
tail drop
196. Which three traffic-related factors would influence
selecting a particular WAN link type? (Choose three.)
cost of the link
amount of traffic
distance between sites
reliability
security needs
type of traffic
neighbor
forwarding
link-state
adjacency