You are here: Home / Cisco / CCNA 2 (v5.03 + v6.0) Chapter 3 Exam Answers for Dynamic Routing Show
Read Chapter wise CCNA 2 Exam Answers (v5.1 + v6.0) CCNA Module 2 Routing and Switching Essentials (Version 6.00) – Rse 6.0 Chapter 3 Exam Answers 2019 1. Which dynamic routing protocol was developed to interconnect different Internet service providers?
2. Which routing protocol is limited to smaller network implementations because it does not accommodate growth for larger networks?
3. What two tasks do dynamic routing protocols perform? (Choose two.)
4. When would it be more beneficial to use a dynamic routing protocol instead of static routing?
5. When would it be more beneficial to use static routing instead of dynamic routing protocols?
6. What is a purpose of the network command when configuring RIPv2 as the routing protocol?
7. A network administrator configures a static route on the edge router of a network to assign a gateway of last resort. How would a network administrator configure the edge router to automatically share this route within RIP?
8. What is the purpose of the passive-interface command?
9. Which route would be automatically created when a router interface is activated and configured with an IP address?
10. Refer to the exhibit. Which two types of routes could be used to describe the
192.168.200.0/30 route? (Choose two.)
11. What occurs next in the router lookup process after a router identifies a destination IP address and locates a matching level 1 parent route?
12. Which route would be used to forward a packet with a source IP address of 192.168.10.1 and a destination IP address of 10.1.1.1?
13. Which two requirements are used to determine if a route can be considered as an ultimate route in a router’s routing table? (Choose two.)
14. What is a disadvantage of using dynamic routing protocols?
15. Which two statements are true regarding classless routing protocols? (Choose two.)
16. Refer to the exhibit. Based on the partial output from the show ip route command, what two facts can be determined about the RIP routing protocol? (Choose two.)
17. While configuring RIPv2 on an enterprise network, an engineer enters the command network 192.168.10.0 into router configuration mode. What is the result of entering this command?
18. A destination route in the routing table is indicated with a code D. Which kind of route entry is this?
19. Refer to the exhibit. Which interface will be the exit interface to forward a data packet with the destination IP address 172.16.0.66?
20. Which type of route will require a router to perform a recursive lookup?
21. Which route is the best match for a packet entering a router with a destination address of 10.16.0.2?
22. A router is configured to participate in multiple routing protocol: RIP, EIGRP, and OSPF. The router must send a packet to network 192.168.14.0. Which route will be used to forward the traffic?
23. What is different between IPv6 routing table entries compared to IPv4 routing table entries?
24. Match the dynamic routing protocol component to the characteristic. (Not all options are used.). data structures tables or databases that are stored in RAM* routing protocol messages exchanges routing information and maintains accurate information about networks* algorithm a finite list of steps used to determine the best path* 25. Match the characteristic to the corresponding type of routing. (Not all options are used.) Place the options in the following order: [+] typically used on stub networks * [+] less routing overhead * [#] new networks are added automatically to the routing table * [#] best choice for large networks* Older Version: CCNA 2 Chapter 3 Exam Answers v5.11. Which three statements accurately describe VLAN types? (Choose three).
2.Which type of VLAN is used to designate which traffic is untagged when crossing a trunk port?
3. What are three primary benefits of using VLANs? (Choose three.)
4.
Refer to the exhibit. A frame is traveling between PC-A and PC-B through the switch. Which statement is true concerning VLAN tagging of the frame?
5. Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?
6. What must the network administrator do to remove Fast Ethernet port fa0/1 from VLAN 2 and assign it to VLAN 3?
7. A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task?
8. Which two characteristics match extended range VLANs? (Choose two.)
9. What happens to switch ports after the VLAN to which they are assigned is deleted?
10. A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a switchport trunk allowed vlan 30 command on Fa0/5?
11. What VLANs are allowed across a trunk when the range of allowed VLANs is set to the default value?
12. Which command should the network administrator implement to prevent the transfer of DTP frames between a Cisco switch and a non-Cisco switch?
13. Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)
14. In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
15. Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
16. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?
17. Match the IEEE 802.1Q standard VLAN tag field with the description. (Not all options are used.)
18. A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)
19. What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?
20. Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?
21. Which command is used to remove only VLAN 20 from a switch?
22. A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a 23. command on Fa0/5?
24. Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
25.
26. What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?
27. In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
28. Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
29. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?
30. Match the DTP mode with its function. (Not all options are used.) 31. A network administrator is determining the best placement of VLAN trunk links. Which two types of point-to-point connections utilize VLAN trunking? (Choose two.)
32. What happens to a port that is associated with VLAN 10 when the administrator deletes VLAN 10 from the switch?
33. Refer to the exhibit. Interface Fa0/1 is connected to a PC. Fa0/2 is a trunk link to another switch. All other ports are unused. Which security best practice did the administrator forget to configure?
34. Which command is used to remove only VLAN 20 from a switch?
35. What is the effect of issuing a switchport access vlan 20 command on the Fa0/18 port of a switch that does not have this VLAN in the VLAN database?
36.Place the options in the following order: – not scored – dynamic auto* nonegotiate* dynamic desirable* trunk* 37. Port Fa0/11 on a switch is assigned to VLAN 30. If the command no switchport access vlan 30 is entered on the Fa0/11 interface, what will happen?
38. Which two Layer 2 security best practices would help prevent VLAN hopping attacks? (Choose two.)
39. In a basic VLAN hopping attack, which switch feature do attackers take advantage of?
40. Refer to the exhibit. PC-A and PC-B are both in VLAN 60. PC-A is unable to communicate with PC-B. What is the problem?
41. Under which two occasions should an administrator disable DTP while managing a local area network? (Choose two.)
42. Open the PT Activity. Perform the
tasks in the activity instructions and then answer the question. Which PCs will receive the broadcast sent by PC-C?
43. Which two statements are true about VLAN implementation? (Choose two.)
44.
Refer to the exhibit. DLS1 is connected to another switch, DLS2, via a trunk link. A host that is connected to DLS1 is not able to communicate to a host that is connected to DLS2, even though they are both in VLAN 99. Which command should be added to Fa0/1 on DLS1 to correct the problem?
45. Which switch feature ensures that no unicast, multicast, or broadcast traffic is passed between ports that are configured with this feature?
46. Fill in the blank. Use the full command
syntax. 47. Which combination of DTP modes set on adjacent Cisco switches will cause the link to become an access link instead of a trunk link?
48. An administrator has determined that the traffic from a switch that corresponds to a VLAN is not being received on another switch over a trunk link. What could be the problem?
49. What is the default DTP mode on Cisco 2960 and 3560 switches?
50. Refer to the exhibit.
51. Match the IEEE 802.1Q standard VLAN tag field in the description. (not all options are used) Place the options in the following order: User Priority – value that supports level or service implementation Type – value for the tag protocol ID value Canonical Format Identifier – identifier that enables Token Ring frames to be carried across Ethernet Links – not scored – -value for the application protocol of the user data in a frame* VLAN ID – VLAN number 52. Which two modes does Cisco recommend when configuring a particular switch port? (Choose two.)
More Resources
When would it be beneficial to use a dynamic routing protocol?Dynamic routing provides key advantages over static routing, including scalability and adaptability. A dynamically routed network can grow larger more quickly and is able to adapt to changes in the network topology brought about by this growth or by the failure of one or more network components.
Why would you want to use a dynamic routing protocol instead of using static routes?Why would you want to use a dynamic routing protocol instead of using static routes? Dynamic routing is typically used in today's networks because it scales to larger networks and takes less administrative work.
What are the advantages of using dynamic routing static and default routing?Static routing provides some advantages over dynamic routing, including: Static routes are not advertised over the network, resulting in better security. Static routes use less bandwidth than dynamic routing protocols, as routers do not exchange routes. No CPU cycles are used to calculate and communicate routes.
Which is better static routing or dynamic routing?Security
Static routing is more secure because it doesn't share routes across the entire network. Dynamic routing creates more security risks because it shares complete routing tables across the network.
|