CCNA 2: Routing & Switching Essentials (V6.0)

CCNA 2 Final Exam V6.0 Answers

1. Refer to the exhibit. NAT is configured on Remote and Main. The PC is sending a request to the web server. What Ipv4 address is the source IP address in the packet between Main and the web server?

The PC is sending a request to the web server

209.165.200.245

10.130.5.76

192.0.2.1

172.16.1.10

209.165.200.226

203.0.113.5

 

2. Which information does a switch use to populate the MAC address table?

The destination MAC address and the outgoing port

the source MAC address and the outgoing port

the destination MAC address and the incoming port

the source and destination MAC addresses and the outgoing port

the source and destination MAC addresses and the incoming port

the source MAC address and the incoming port

CCNA 2 Chapter 10 V6.0 Answers

1. The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?

determines which server to send system log files to

synchronizes the system clock with the time source with IP address 10.1.1.1

identifies the server on which to store backup configurations

ensures that all logging will have a time stamp associated with it

 

2. Refer to the exhibit. Which two conclusions can be drawn from the syslog message that was generated by the router? (Choose two.)

Which two conclusions can be drawn from the syslog message that was generated by the router?

This message indicates that the interface changed state five times.

This message indicates that the interface should be replaced.

This message indicates that service timestamps have been configured.

This message is a level 5 notification message.

This message resulted from an unusual error requiring reconfiguration of the interface.

CCNA 2 Chapter 9 V6.0 Answers

1. What is a disadvantage of NAT?

The internal hosts have to use a single public IPv4 address for external communication.

There is no end-to-end addressing.

The router does not need to alter the checksum of the IPv4 packets.

The costs of readdressing hosts can be significant for a publicly addressed network.

 

2. Which statement describes IPv6 ULAs?

They begin with the fe80::/10 prefix.

They are assigned by an ISP.

They are not routable across the internet.

They conserve IPv6 address space.

CCNA 2 Chapter 8 V6.0 Answers

1. Match the descriptions to the corresponding DHCPv6 sever type. (Not all options are used.)

Match the descriptions to the corresponding DHCPv6 sever type

Place the options in the following order:

Stateless DHCPv6

[+] enabled in RA messages with the ipv6 nd other-config-flag command

[+] clients send only DHCPv6 INFORMATION-REQUEST messages to the server

[+] enabled on the client with the ipv6 address autoconfig command

Stateful DHCPv6

[#] the M flag is set to 1 in RA messages

[#] uses the address command to create a pool of addresses for clients

[#] enabled on the client with the ipv6 address dhcp command

 

2. Order the steps of configuring a router as a DHCPv4 server. (Not all options are used.)

Order the steps of configuring a router as a DHCPv4 server

Place the options in the following order:

[+] Step 2 -> Configure a DHCP pool.

[+] Step 1 -> Exclude IP addresses.

[+] Step 3 ->Define the default gateway router

CCNA 2 Chapter 7 V6.0 Answers

1. Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?

R1#

Standard IP access list 2

10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)

20 deny any (1 match)

Traffic from two devices was allowed to enter one router port and be routed outbound to a different router port.

Two devices were able to use SSH or Telnet to gain access to the router.

Two devices connected to the router have IP addresses of 192.168.10.x.

Traffic from one device was not allowed to come into one router port and be routed outbound a different router port.

 

2. On which router should the show access-lists command be executed?

On any router through which the packet referenced in the ACL travels

on the router that routes the packet referenced in the ACL to the final destination network

on the router that routes the packet referenced in the ACL from the source network

on the router that has the ACL configured

CCNA 2 Chapter 6 V6.0 Answers

1. Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?

default

native

management

data

 

2. What are three primary benefits of using VLANs? (Choose three.)

end user satisfaction

a reduction in the number of trunk links

security

improved IT staff efficiency

cost reduction

no required configuration

CCNA 2 Chapter 5 V6.0 Answers

1. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if there is a port security violation on switch S1 interface Fa0/1?

Which event will take place if there is a port security violation on switch S1 interface Fa0/1?;

The interface will go into error-disabled state.

Packets with unknown source addresses will be dropped.

A syslog message is logged.

A notification is sent.

 

2. Identify the steps needed to configure a switch for SSH. The answer order does not matter. (Not all options are used.)

Identify the steps needed to configure a switch for SSH

Place the options in the following order:

[+] Create a local user.

[+] Generate RSA keys.

[+] Configure a domain name.

[+] Use the login local command.

[+] Use the transport input ssh command.

[+] Order does not matter within this group.

CCNA 2 Chapter 4 V6.0 Answers

1. What is one function of a Layer 2 switch?

determines which interface is used to forward a frame based on the destination MAC address

learns the port assigned to a host by examining the destination MAC address

duplicates the electrical signal of each frame to every port

forwards data based on logical addressing

 

2. Which two previously independent technologies should a network administrator attempt to combine after choosing to upgrade to a converged network infrastructure? (Choose two.)

mobile cell phone traffic

scanners and printers

user data traffic

VoIP phone traffic

electrical system

CCNA 2 Chapter 3 V6.0 Answers

1. What is a purpose of the network command when configuring RIPv2 as the routing protocol?

It identifies the interfaces that belong to a specified network.

It specifies the remote network that can now be reached.

It populates the routing table with the network entry.

It immediately advertises the specified network to neighbor routers with a classful mask.

 

2. A network administrator configures a static route on the edge router of a network to assign a gateway of last resort. How would a network administrator configure the edge router to automatically share this route within RIP?

Use the default-information originate command.

Use the passive-interface command.

Use the auto-summary command.

Use the network command.

CCNA 2 Chapter 2 V6.0 Answers

1. Why would a floating static route be configured with an administrative distance that is higher than the administrative distance of a dynamic routing protocol that is running on the same router?

to be used as a backup route

to be the priority route in the routing table

to act as a gateway of last resort

to load-balance the traffic

 

2. Which three IOS troubleshooting commands can help to isolate problems with a static route? (Choose three.)

show arp

tracert

show ip interface brief

ping

show ip route

show version