Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

CCNA 2 v6 RSE Practice Final Exam Online

Last Updated on May 20, 2021 by Admin

CCNA 2 v6 RSE Practice Final Exam Online

RSE -- Practice Final Exam

Time limit: 0

Quiz-summary

0 of 50 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50

Information

RSE — Practice Final Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 50 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  1. Answered
  2. Review
  1. Question 1 of 50
    1. Question
    1 points

    The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?

    Correct

    Incorrect

    RAM provides temporary storage for the running IOS, the running configuration file, the IP routing table, ARP table, and buffers for packet processing. In contrast, permanent storage of the IOS is provided by flash. NVRAM provides permanent storage of the startup configuration file, and ROM.provides permanent storage of the router bootup instructions and a limited IOS.

    Hint

    RAM provides temporary storage for the running IOS, the running configuration file, the IP routing table, ARP table, and buffers for packet processing. In contrast, permanent storage of the IOS is provided by flash. NVRAM provides permanent storage of the startup configuration file, and ROM.provides permanent storage of the router bootup instructions and a limited IOS.

  2. Question 2 of 50
    2. Question
    1 points

    What is the minimum configuration for a router interface that is participating in IPv6 routing?

    Correct

    Incorrect

    With IPv6, a router interface typically has more than one IPv6 address. The router will at least have a link-local address that can be automatically generated, but the router commonly has an global unicast address also configured.

    Hint

    With IPv6, a router interface typically has more than one IPv6 address. The router will at least have a link-local address that can be automatically generated, but the router commonly has an global unicast address also configured.

  3. Question 3 of 50
    3. Question
    1 points

    Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 04
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 04

    Correct

    Incorrect

    H1 creates the first Layer 2 header. The R1 router has to examine the destination IP address to determine how the packet is to be routed. If the packet is to be routed out another interface, as is the case with R1, the router strips the current Layer 2 header and attaches a new Layer 2 header. When R2 determines that the packet is to be sent out the LAN interface, R2 removes the Layer 2 header received from the serial link and attaches a new Ethernet header before transmitting the packet.

    Hint

    H1 creates the first Layer 2 header. The R1 router has to examine the destination IP address to determine how the packet is to be routed. If the packet is to be routed out another interface, as is the case with R1, the router strips the current Layer 2 header and attaches a new Layer 2 header. When R2 determines that the packet is to be sent out the LAN interface, R2 removes the Layer 2 header received from the serial link and attaches a new Ethernet header before transmitting the packet.

  4. Question 4 of 50
    4. Question
    1 points

    What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?

    Correct

    Incorrect

    To enable IPv6 on a router you must use the ipv6 unicast-routing global configuration command or use the ipv6 enable interface configuration command. This is equivalent to entering ip routing to enable IPv4 routing on a router when it has been turned off. Keep in mind that IPv4 is enabled on a router by default. IPv6 is not enabled by default.

    Hint

    To enable IPv6 on a router you must use the ipv6 unicast-routing global configuration command or use the ipv6 enable interface configuration command. This is equivalent to entering ip routing to enable IPv4 routing on a router when it has been turned off. Keep in mind that IPv4 is enabled on a router by default. IPv6 is not enabled by default.

  5. Question 5 of 50
    5. Question
    1 points

    Which type of static route typically uses the distance parameter in the ip route global configuration command?

    Correct

    Incorrect

    Because a floating static route is not designed to be used as a primary route, its configuration requires a higher administrative distance than the usual default value of 1. When set higher than the administrative distance for the current routing protocol, the distance parameter allows the route to be used only when the primary route fails. All other forms of static routes have specific uses as primary routes.

    Hint

    Because a floating static route is not designed to be used as a primary route, its configuration requires a higher administrative distance than the usual default value of 1. When set higher than the administrative distance for the current routing protocol, the distance parameter allows the route to be used only when the primary route fails. All other forms of static routes have specific uses as primary routes.

  6. Question 6 of 50
    6. Question
    1 points

    Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 05
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 05

    Correct

    Incorrect

    The C in a routing table indicates an interface that is up and has an IP address assigned. The S in a routing table signifies that a route was installed using the ip route command. Two of the routing table entries shown are static routes to a specific destination (the 10.0.2.0 network). The entry that has the S denoting a static route and [1/0] was configured using the next-hop address. The other entry (S 10.0.2.0/24 is directly connected, Serial 0/0/0) is a static route configured using the exit interface. The entry with the 0.0.0.0 route is a default static route which is used to send packets to any destination network that is not specifically listed in the routing table.

    Hint

    The C in a routing table indicates an interface that is up and has an IP address assigned. The S in a routing table signifies that a route was installed using the ip route command. Two of the routing table entries shown are static routes to a specific destination (the 10.0.2.0 network). The entry that has the S denoting a static route and [1/0] was configured using the next-hop address. The other entry (S 10.0.2.0/24 is directly connected, Serial 0/0/0) is a static route configured using the exit interface. The entry with the 0.0.0.0 route is a default static route which is used to send packets to any destination network that is not specifically listed in the routing table.

  7. Question 7 of 50
    7. Question
    1 points

    Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?

    Correct

    Incorrect

    The route provided points to another address that must be looked up in the routing table. This makes the route a recursive static route.

    Hint

    The route provided points to another address that must be looked up in the routing table. This makes the route a recursive static route.

  8. Question 8 of 50
    8. Question
    1 points

    A network administrator has entered the following command:

    ip route 192.168.10.64 255.255.255.192 serial0/0/1

    When the network administrator enters the command show ip route, the route is not in the routing table. What should the administrator do next?

    Correct

    Incorrect

    The reason that a correctly typed static network would not go into the routing table is if the exit interface is not available. The 192.168.10.64 is a valid network number and that route does not have to be “up and up” in order for a static route to be configured on a remote router.

    Hint

    The reason that a correctly typed static network would not go into the routing table is if the exit interface is not available. The 192.168.10.64 is a valid network number and that route does not have to be “up and up” in order for a static route to be configured on a remote router.

  9. Question 9 of 50
    9. Question
    1 points

    Refer to the exhibit. This network has two connections to the ISP, one via router C and one via router B. The serial link between router A and router C supports EIGRP and is the primary link to the Internet. If the primary link fails, the administrator needs a floating static route that avoids recursive route lookups and any potential next-hop issues caused by the multiaccess nature of the Ethernet segment with router B. What should the administrator configure?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 09
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 09

    Correct

    Incorrect

    A floating static route is a static route with an administrative distance higher than that of another route already in the routing table. If the route in the table disappears, the floating static route will be put into the routing table in its place. Internal EIGRP has an AD of 90, so a floating static route in this scenario would need to have an AD higher than 90. Also, when creating a static route to a multiaccess interface like a FastEthernet segment a fully specified route should be used, with both a next-hop IP address and an exit interface. This prevents the router from doing a recursive lookup, but still ensures the correct next-hop device on the multiaccess segment forwards the packet.

    Hint

    A floating static route is a static route with an administrative distance higher than that of another route already in the routing table. If the route in the table disappears, the floating static route will be put into the routing table in its place. Internal EIGRP has an AD of 90, so a floating static route in this scenario would need to have an AD higher than 90. Also, when creating a static route to a multiaccess interface like a FastEthernet segment a fully specified route should be used, with both a next-hop IP address and an exit interface. This prevents the router from doing a recursive lookup, but still ensures the correct next-hop device on the multiaccess segment forwards the packet.

  10. Question 10 of 50
    10. Question
    1 points

    Refer to the exhibit. How did the router obtain the last route that is shown?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 02
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 02

    Correct

    Incorrect

    A default route is presented in EIGRP with an asterisk (*) and the 0.0.0.0/0 entry. The route was learned through EIGRP and the Serial0/0/1 interface on the router.

    Hint

    A default route is presented in EIGRP with an asterisk (*) and the 0.0.0.0/0 entry. The route was learned through EIGRP and the Serial0/0/1 interface on the router.

  11. Question 11 of 50
    11. Question
    1 points

    To enable RIP routing for a specific subnet, the configuration command network 192.168.5.64 was entered by the network administrator. What address, if any, appears in the running configuration file to identify this network?

    Correct

    Incorrect

    RIP is a classful routing protocol, meaning it will automatically convert the subnet ID that was entered into the classful address of 192.168.5.0 when it is displayed in the running configuration.

    Hint

    RIP is a classful routing protocol, meaning it will automatically convert the subnet ID that was entered into the classful address of 192.168.5.0 when it is displayed in the running configuration.

  12. Question 12 of 50
    12. Question
    1 points

    Refer to the exhibit. What is the administrative distance value that indicates the route for R2 to reach the 10.10.0.0/16 network?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 08
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 08

    Correct

    Incorrect

    Router 2 is using a static route to reach network 10.10.0.0 and static routes have an administrative distance of 1.

    Hint

    Router 2 is using a static route to reach network 10.10.0.0 and static routes have an administrative distance of 1.

  13. Question 13 of 50
    13. Question
    1 points

    Refer to the exhibit. Which type of route is 172.16.0.0/16?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 14
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 14

    Correct

    Incorrect

    A level 1 parent route displays the classful network address, the number of subnets, and the number of different subnet masks that the classful address has been subdivided into. It does not have an exit interface. A child route, ultimate route, and default route all have exit interfaces that are associated with them.

    Hint

    A level 1 parent route displays the classful network address, the number of subnets, and the number of different subnet masks that the classful address has been subdivided into. It does not have an exit interface. A child route, ultimate route, and default route all have exit interfaces that are associated with them.

  14. Question 14 of 50
    14. Question
    1 points

    In an IPv6 routing table, all routing table entries are classified as which type of routes?

    Correct

    Incorrect

    IPv6 is classless by design, making all routes level 1 ultimate routes by default.

    Hint

    IPv6 is classless by design, making all routes level 1 ultimate routes by default.

  15. Question 15 of 50
    15. Question
    1 points

    What is the name of the layer in the Cisco borderless switched network design that would have more switches deployed than other layers in the network design of a large organization?

    Correct

    Incorrect

    Access layer switches provide user access to the network. End user devices, such as PCs, access points, printers, and copiers, would require a port on a switch in order to connect to the network. Thus, more switches are needed in the access layer than are needed in the core and distribution layers.

    Hint

    Access layer switches provide user access to the network. End user devices, such as PCs, access points, printers, and copiers, would require a port on a switch in order to connect to the network. Thus, more switches are needed in the access layer than are needed in the core and distribution layers.

  16. Question 16 of 50
    16. Question
    1 points

    What is a function of the distribution layer?

    Correct

    Incorrect

    The distribution layer interacts between the access layer and the core by aggregating access layer connections in wiring closets, providing intelligent routing and switching, and applying access policies to access the rest of the network. Fault isolation and high-speed backbone connectivity are the primary functions of the core layer. The main function of the access layer is to provide network access to the user.

    Hint

    The distribution layer interacts between the access layer and the core by aggregating access layer connections in wiring closets, providing intelligent routing and switching, and applying access policies to access the rest of the network. Fault isolation and high-speed backbone connectivity are the primary functions of the core layer. The main function of the access layer is to provide network access to the user.

  17. Question 17 of 50
    17. Question
    1 points

    Which network design principle focuses on the capability of on-demand seamless network expansion in a switched network?

    Correct

    Incorrect

    There are several sound network design principles that should be used when building design guidelines for a borderless switched network:
    Hierarchical – Defines the role of each device at every tier, simplifies deployment, operation, and management, and reduces fault domains at every tier
    Modularity – Allows seamless network expansion and integrated service enablement on an on-demand basis
    Resiliency – Satisfies user expectations for keeping the network always on
    Flexibility – Allows intelligent traffic load sharing by using multiple network resources simultaneously

    Hint

    There are several sound network design principles that should be used when building design guidelines for a borderless switched network:
    Hierarchical – Defines the role of each device at every tier, simplifies deployment, operation, and management, and reduces fault domains at every tier
    Modularity – Allows seamless network expansion and integrated service enablement on an on-demand basis
    Resiliency – Satisfies user expectations for keeping the network always on
    Flexibility – Allows intelligent traffic load sharing by using multiple network resources simultaneously

  18. Question 18 of 50
    18. Question
    1 points

    A lab in a network management software company is configuring a testing environment to verify the performance of new software with different network connectivity speeds, including FastEthernet, GigabitEthernet, and 10 GigabitEthernet, and with copper and fiber optic connections. Which type of switch should the software company purchase to perform the tests?

    Correct

    Incorrect

    A modular configuration switch is used at the distribution and core layers. A modular configuration switch usually takes 3 rack units or more. Modular configuration switches offer more flexibility in the types and number of ports as well as the expansion cards that can be used. A fixed configuration switch tends to be an access layer switch. Stackable switches are usually access layer switches that have been cabled together.

    Hint

    A modular configuration switch is used at the distribution and core layers. A modular configuration switch usually takes 3 rack units or more. Modular configuration switches offer more flexibility in the types and number of ports as well as the expansion cards that can be used. A fixed configuration switch tends to be an access layer switch. Stackable switches are usually access layer switches that have been cabled together.

  19. Question 19 of 50
    19. Question
    1 points

    What information is added to the switch table from incoming frames?

    Correct

    Incorrect

    A switch “learns” or builds the MAC address table based on the source MAC address as a frame comes into the switch. A switch forwards the frame onward based on the destination MAC address.

    Hint

    A switch “learns” or builds the MAC address table based on the source MAC address as a frame comes into the switch. A switch forwards the frame onward based on the destination MAC address.

  20. Question 20 of 50
    20. Question
    1 points

    Which statement correctly describes how a LAN switch forwards frames that it receives?

    Correct

    Incorrect

    Cut-through frame forwarding reads up to only the first 22 bytes of a frame, which excludes the frame check sequence and thus invalid frames may be forwarded. In addition to broadcast frames, frames with a destination MAC address that is not in the CAM are also flooded out all active ports. Unicast frames are not always forwarded. Received frames with a destination MAC address that is associated with the switch port on which it is received are not forwarded because the destination exists on the network segment connected to that port.

    Hint

    Cut-through frame forwarding reads up to only the first 22 bytes of a frame, which excludes the frame check sequence and thus invalid frames may be forwarded. In addition to broadcast frames, frames with a destination MAC address that is not in the CAM are also flooded out all active ports. Unicast frames are not always forwarded. Received frames with a destination MAC address that is associated with the switch port on which it is received are not forwarded because the destination exists on the network segment connected to that port.

  21. Question 21 of 50
    21. Question
    1 points

    Which switching method provides error-free data transmission?

    Correct

    Incorrect

  22. Question 22 of 50
    22. Question
    1 points

    Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?

    Correct

    Incorrect

    If an interface has not been brought up with the no shutdown command, the interface status shows administratively down. A duplicate IP address will not bring an interface down. An encapsulation error is normally found using the show interfaces command.

    Hint

    If an interface has not been brought up with the no shutdown command, the interface status shows administratively down. A duplicate IP address will not bring an interface down. An encapsulation error is normally found using the show interfaces command.

  23. Question 23 of 50
    23. Question
    1 points

    A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?

    Correct

    Incorrect

    With sticky secure MAC addressing, the MAC addresses can be either dynamically learned or manually configured and then stored in the address table and added to the running configuration file. In contrast, dynamic secure MAC addressing provides for dynamically learned MAC addressing that is stored only in the address table.

    Hint

    With sticky secure MAC addressing, the MAC addresses can be either dynamically learned or manually configured and then stored in the address table and added to the running configuration file. In contrast, dynamic secure MAC addressing provides for dynamically learned MAC addressing that is stored only in the address table.

  24. Question 24 of 50
    24. Question
    1 points

    A network technician is configuring port security on switches. The interfaces on the switches are configured in such a way that when a violation occurs, packets with unknown source addresses are dropped and no notification is sent. Which violation mode is configured on the interfaces?

    Correct

    Incorrect

    On a Cisco switch, an interface can be configured for one of three violation modes, specifying the action to be taken if a violation occurs:
    Protect – Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. There is no notification that a security violation has occurred.
    Restrict – Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. In this mode, there is a notification that a security violation has occurred.
    Shutdown – The interface immediately becomes error-disabled and the port LED is turned off.

    Hint

    On a Cisco switch, an interface can be configured for one of three violation modes, specifying the action to be taken if a violation occurs:
    Protect – Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. There is no notification that a security violation has occurred.
    Restrict – Packets with unknown source addresses are dropped until a sufficient number of secure MAC addresses are removed, or the number of maximum allowable addresses is increased. In this mode, there is a notification that a security violation has occurred.
    Shutdown – The interface immediately becomes error-disabled and the port LED is turned off.

  25. Question 25 of 50
    25. Question
    1 points

    After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down?

    Correct

    Incorrect

    When sticky learning is enabled, dynamically learned MAC addresses are stored in the running configuration in RAM and will be lost if the switch is rebooted or an interface goes down. To prevent the loss of learned MAC addresses, an administrator can save the running configuration into the startup configuration in NVRAM.

    Hint

    When sticky learning is enabled, dynamically learned MAC addresses are stored in the running configuration in RAM and will be lost if the switch is rebooted or an interface goes down. To prevent the loss of learned MAC addresses, an administrator can save the running configuration into the startup configuration in NVRAM.

  26. Question 26 of 50
    26. Question
    1 points

    Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 07
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 07

    Correct

    Incorrect

    Cisco recommends using a VLAN that is not used for anything else for the native VLAN. The native VLAN should also not be left to the default of VLAN 1. VLAN 5 is the only VLAN that is not used and not VLAN 1.

    Hint

    Cisco recommends using a VLAN that is not used for anything else for the native VLAN. The native VLAN should also not be left to the default of VLAN 1. VLAN 5 is the only VLAN that is not used and not VLAN 1.

  27. Question 27 of 50
    27. Question
    3 points

    Which three statements accurately describe VLAN types? (Choose three).

    Correct

    Incorrect

  28. Question 28 of 50
    28. Question
    1 points

    Which type of traffic requires a separate VLAN, strict QoS requirements, and a one-way overall delay of less than 150 ms across the network?

    Correct

    Incorrect

    VoIP traffic tends to have a separate VLAN to ensure that voice quality is maintained. VoIP traffic requires the following:Assured bandwidth to ensure voice quality
    Transmission priority over other types of network traffic
    Ability to be routed around congested areas on the network
    Delay of less than 150 ms across the network

    Hint

    VoIP traffic tends to have a separate VLAN to ensure that voice quality is maintained. VoIP traffic requires the following:Assured bandwidth to ensure voice quality
    Transmission priority over other types of network traffic
    Ability to be routed around congested areas on the network
    Delay of less than 150 ms across the network

  29. Question 29 of 50
    29. Question
    1 points

    A technician is configuring a switch to allow access both to IP phones and to PCs on interface Fa0/12. The technician enters the interface command mls qos trust cos. What is the reason for including that command?

    Correct

    Incorrect

    The class of service (CoS) value is a number placed inside a field in the 802.1Q or ISL trunking header and used for prioritizing traffic and providing quality of service (QoS). The mls qos trust cos command is used when a VoIP phone attaches to a Cisco switch and QoS is implemented.

    Hint

    The class of service (CoS) value is a number placed inside a field in the 802.1Q or ISL trunking header and used for prioritizing traffic and providing quality of service (QoS). The mls qos trust cos command is used when a VoIP phone attaches to a Cisco switch and QoS is implemented.

  30. Question 30 of 50
    30. Question
    1 points

    Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces?

    Correct

    Incorrect

    The router-on-a-stick design always includes subinterfaces on a router. When a multilayer switch is used, multiple SVIs are created. When the number of VLANs equals the number of ports on a router, or when the management VLAN needs to be routed, any of the inter-VLAN design methods can be used.

    Hint

    The router-on-a-stick design always includes subinterfaces on a router. When a multilayer switch is used, multiple SVIs are created. When the number of VLANs equals the number of ports on a router, or when the management VLAN needs to be routed, any of the inter-VLAN design methods can be used.

  31. Question 31 of 50
    31. Question
    1 points

    A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address matches the ACE?

    Correct

    Incorrect

    With the wildcard mask of 0.0.15.255, the IPv4 addresses that match the ACE are in the range of 172.16.32.0 to 172.16.47.255.

    Hint

    With the wildcard mask of 0.0.15.255, the IPv4 addresses that match the ACE are in the range of 172.16.32.0 to 172.16.47.255.

  32. Question 32 of 50
    32. Question
    1 points

    Which command is issued in the VTY line configuration mode to apply a standard ACL that will control Telnet access to a router?

    Correct

    Incorrect

    The access-class 11 in command applies a standard ACL to the VTY lines of a router to control Telnet and SSH access. The ip access-group 11 in command would be issued on a router interface to apply a standard ACL, and because it applies a standard ACL, all IP traffic will be filtered, not just Telnet and SSH communications bound for the VTY lines. The transport input none command defines which protocol is used to connect to the VTY lines.

    Hint

    The access-class 11 in command applies a standard ACL to the VTY lines of a router to control Telnet and SSH access. The ip access-group 11 in command would be issued on a router interface to apply a standard ACL, and because it applies a standard ACL, all IP traffic will be filtered, not just Telnet and SSH communications bound for the VTY lines. The transport input none command defines which protocol is used to connect to the VTY lines.

  33. Question 33 of 50
    33. Question
    1 points

    Which series of commands will cause access list 15 to restrict Telnet access on a router?

    Correct

    Incorrect

    Once an access list to restrict Telnet or SSH access has been created, it is applied to the vty lines with the access-class command. This will restrict Telnet or SSH access.

    Hint

    Once an access list to restrict Telnet or SSH access has been created, it is applied to the vty lines with the access-class command. This will restrict Telnet or SSH access.

  34. Question 34 of 50
    34. Question
    1 points

    Which DHCP IPv4 message contains the following information?

    Destination address: 255.255.255.255
    Client IPv4 address: 0.0.0.0
    Default gateway address: 0.0.0.0
    Subnet mask: 0.0.0.0

    Correct

    Incorrect

    A client will first send the DHCPDISCOVER broadcast message to find DHCPv4 servers on the network. This message will have the limited broadcast address, 255.255.255.255, as the destination address. The client IPv4 address, the default gateway address, and subnet fields will all be 0.0.0.0 because these have not yet been configured on the client. When the DHCPv4 server receives a DHCPDISCOVER message, it reserves an available IPv4 address to lease to the client and sends the unicast DHCPOFFER message to the requesting client. When the client receives the DHCPOFFER from the server, it sends back a DHCPREQUEST broadcast message. On receiving the DHCPREQUEST message, the server replies with a unicast DHCPACK message.

    Hint

    A client will first send the DHCPDISCOVER broadcast message to find DHCPv4 servers on the network. This message will have the limited broadcast address, 255.255.255.255, as the destination address. The client IPv4 address, the default gateway address, and subnet fields will all be 0.0.0.0 because these have not yet been configured on the client. When the DHCPv4 server receives a DHCPDISCOVER message, it reserves an available IPv4 address to lease to the client and sends the unicast DHCPOFFER message to the requesting client. When the client receives the DHCPOFFER from the server, it sends back a DHCPREQUEST broadcast message. On receiving the DHCPREQUEST message, the server replies with a unicast DHCPACK message.

  35. Question 35 of 50
    35. Question
    1 points

    Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 12
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 12

    Correct

    Incorrect

    In this configuration, the excluded address list should include the address that is assigned to the default gateway router. So the command should be ip dhcp excluded-address 192.168.10.1 192.168.10.9.

    Hint

    In this configuration, the excluded address list should include the address that is assigned to the default gateway router. So the command should be ip dhcp excluded-address 192.168.10.1 192.168.10.9.

  36. Question 36 of 50
    36. Question
    1 points

    A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

    Correct

    Incorrect

    Stateless DHCPv6 or stateful DHCPv6 uses a DHCP server, but Stateless Address Autoconfiguration (SLAAC) does not. A SLAAC client can automatically generate an address that is based on information from local routers via Router Advertisement (RA) messages. Once an address has been assigned to an interface via SLAAC, the client must ensure via Duplicate Address Detection (DAD) that the address is not already in use. It does this by sending out an ICMPv6 Neighbor Solicitation message and listening for a response. If a response is received, then it means that another device is already using this address.

    Hint

    Stateless DHCPv6 or stateful DHCPv6 uses a DHCP server, but Stateless Address Autoconfiguration (SLAAC) does not. A SLAAC client can automatically generate an address that is based on information from local routers via Router Advertisement (RA) messages. Once an address has been assigned to an interface via SLAAC, the client must ensure via Duplicate Address Detection (DAD) that the address is not already in use. It does this by sending out an ICMPv6 Neighbor Solicitation message and listening for a response. If a response is received, then it means that another device is already using this address.

  37. Question 37 of 50
    37. Question
    1 points

    A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?

    Correct

    Incorrect

    Under stateful DHCPv6 configuration, which is indicated by setting M flag as 1 (through the interface command ipv6 nd managed-config-flag), the dynamic IPv6 address assignments are managed by the DHCPv6 server. Clients must obtain all configuration information from a DHCPv6 server.

    Hint

    Under stateful DHCPv6 configuration, which is indicated by setting M flag as 1 (through the interface command ipv6 nd managed-config-flag), the dynamic IPv6 address assignments are managed by the DHCPv6 server. Clients must obtain all configuration information from a DHCPv6 server.

  38. Question 38 of 50
    38. Question
    1 points

    Refer to the exhibit. The users on the LAN network of R1 cannot receive an IPv6 address from the configured stateful DHCPv6 server. What is missing from the stateful DHCPv6 configuration on router R1?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 11
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 11

    Correct

    Incorrect

    When configuring a router interface for stateful DHCPv6, the router must be able to inform the host PC’s to receive IPv6 addressing from a stateful DHCPv6 server. The interface command is ipv6 nd managed-config-flag

    Hint

    When configuring a router interface for stateful DHCPv6, the router must be able to inform the host PC’s to receive IPv6 addressing from a stateful DHCPv6 server. The interface command is ipv6 nd managed-config-flag

  39. Question 39 of 50
    39. Question
    1 points

    Refer to the exhibit. NAT is configured on R1 and R2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between R2 and the web server?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 03
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 03

    Correct

    Incorrect

    Because the packet is between R2 and the web server, the source IP address is the inside global address of PC, 209.165.200.245.

    Hint

    Because the packet is between R2 and the web server, the source IP address is the inside global address of PC, 209.165.200.245.

  40. Question 40 of 50
    40. Question
    1 points

    What is a disadvantage when both sides of a communication use PAT?

    Correct

    Incorrect

    With the use of NAT, especially PAT, end-to-end traceability is lost. This is because the host IP address in the packets during a communication is translated when it leaves and enters the network. With the use of NAT/PAT, both the flexibility of connections to the Internet and security are actually enhanced. Host IPv4 addressing is provided by DHCP and not related to NAT/PAT.

    Hint

    With the use of NAT, especially PAT, end-to-end traceability is lost. This is because the host IP address in the packets during a communication is translated when it leaves and enters the network. With the use of NAT/PAT, both the flexibility of connections to the Internet and security are actually enhanced. Host IPv4 addressing is provided by DHCP and not related to NAT/PAT.

  41. Question 41 of 50
    41. Question
    1 points

    Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 13
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 13

    Correct

    Incorrect

    R1 has to have NAT-POOL2 bound to ACL 1. This is accomplished with the command R1(config)#ip nat inside source list 1 pool NAT-POOL2. This would enable the router to check for all interesting traffic and if it matches ACL 1 it would be translated by use of the addresses in NAT-POOL2.

    Hint

    R1 has to have NAT-POOL2 bound to ACL 1. This is accomplished with the command R1(config)#ip nat inside source list 1 pool NAT-POOL2. This would enable the router to check for all interesting traffic and if it matches ACL 1 it would be translated by use of the addresses in NAT-POOL2.

  42. Question 42 of 50
    42. Question
    1 points

    A network engineer is configuring PAT on a router and has issued the command:
    ip nat inside source list 1 interface serial 0/1/0 overload
    Which additional command is required to specify addresses from the 192.168.128.0/18 network as the inside local addresses?

    Correct

    Incorrect

    A standard access list with the appropriate wildcard mask specifies the inside local addresses to be translated. The ip nat inside source list 1 pool NAT_POOL command configures NAT to use a pool of outside global addresses, not a single outside interface address as required. The ip nat inside source static 192.168.128.0 209.165.200.254 command configures one-to-one static NAT, not PAT as the overload keyword specifies.

    Hint

    A standard access list with the appropriate wildcard mask specifies the inside local addresses to be translated. The ip nat inside source list 1 pool NAT_POOL command configures NAT to use a pool of outside global addresses, not a single outside interface address as required. The ip nat inside source static 192.168.128.0 209.165.200.254 command configures one-to-one static NAT, not PAT as the overload keyword specifies.

  43. Question 43 of 50
    43. Question
    1 points

    Refer to the exhibit. A company has an internal network of 192.168.10.0/24 for their employee workstations and a DMZ network of 192.168.3.0/24 to host servers. The company uses NAT when inside hosts connect to outside network. A network administrator issues the show ip nat translations command to check the NAT configurations. Which one of source IPv4 addresses is translated by R1 with PAT?

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 06
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 06

    Correct

    Incorrect

    From the output, three IPv4 addresses (192.168.10.10, 192.168.10.15, and 192.168.10.35) are translated into the same IPv4 address (10.0.0.28) with three different ports, thus these three IPv4 addresses are translated with PAT. The IPv4 addresses 192.168.3.33 and 192.168.3.35 are translated with dynamic NAT. The IPv4 address 192.168.3.5 is translated with static NAT.

    Hint

    From the output, three IPv4 addresses (192.168.10.10, 192.168.10.15, and 192.168.10.35) are translated into the same IPv4 address (10.0.0.28) with three different ports, thus these three IPv4 addresses are translated with PAT. The IPv4 addresses 192.168.3.33 and 192.168.3.35 are translated with dynamic NAT. The IPv4 address 192.168.3.5 is translated with static NAT.

  44. Question 44 of 50
    44. Question
    3 points

    Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)

    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 10
    CCNA 2 RSE 6.0 Practice Final Exam Answers 2018 2019 10

    Correct

    Incorrect

    The show ip nat statistics, show ip nat translations, and debug ip nat commands are useful in determining if NAT is working and and also useful in troubleshooting problems that are associated with NAT. NAT is working, as shown by the hits and misses count. Because there are four misses, a problem might be evident. The standard access list numbered 1 is being used and the translation pool is named NAT as evidenced by the last line of the output. Both static NAT and NAT overload are used as seen in the Total translations line.

    Hint

    The show ip nat statistics, show ip nat translations, and debug ip nat commands are useful in determining if NAT is working and and also useful in troubleshooting problems that are associated with NAT. NAT is working, as shown by the hits and misses count. Because there are four misses, a problem might be evident. The standard access list numbered 1 is being used and the translation pool is named NAT as evidenced by the last line of the output. Both static NAT and NAT overload are used as seen in the Total translations line.

  45. Question 45 of 50
    45. Question
    1 points

    Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

    Correct

    Incorrect

    Syslog messages for Cisco routers and switches can be sent to memory, the console, a tty line, or to a syslog server.

    Hint

    Syslog messages for Cisco routers and switches can be sent to memory, the console, a tty line, or to a syslog server.

  46. Question 46 of 50
    46. Question
    1 points

    Which requirement should be checked before a network administrator performs an IOS image upgrade on a router?

    Correct

    Incorrect

    Before an upgrade process starts, the user must make sure that there is sufficient space in the flash to host the new IOS image file. An old IOS file does not have to be deleted as long as there is sufficient space available for the new IOS file. FTP is not supported for the IOS upgrading process. Instead, a TFTP server is used. The new IOS image should be downloaded and loaded to the TFTP server.

    Hint

    Before an upgrade process starts, the user must make sure that there is sufficient space in the flash to host the new IOS image file. An old IOS file does not have to be deleted as long as there is sufficient space available for the new IOS file. FTP is not supported for the IOS upgrading process. Instead, a TFTP server is used. The new IOS image should be downloaded and loaded to the TFTP server.

  47. Question 47 of 50
    47. Question
    1 points

    A network administrator configures a router with the command sequence:

    R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin
    R1(config)# boot system rom

    What is the effect of the command sequence?

    Correct

    Incorrect

    The boot system command is a global configuration command that allows the user to specify the source for the Cisco IOS Software image to load. In this case, the router is configured to boot from the IOS image that is stored on the TFTP server and will use the ROMmon imagethat is located in the ROM if it fails to locate the TFTP server or fails to load a valid image from the TFTP server.

    Hint

    The boot system command is a global configuration command that allows the user to specify the source for the Cisco IOS Software image to load. In this case, the router is configured to boot from the IOS image that is stored on the TFTP server and will use the ROMmon imagethat is located in the ROM if it fails to locate the TFTP server or fails to load a valid image from the TFTP server.

  48. Question 48 of 50
    48. Question
    3 points

    Which three software packages are available for Cisco IOS Release 15.0?

    Correct

    Incorrect

    Cisco IOS Release 15.0 has four available technology software packages.IPBase

    1. DATA
    2. Unified Communications
    3. Security
    Hint

    Cisco IOS Release 15.0 has four available technology software packages.IPBase

    1. DATA
    2. Unified Communications
    3. Security
  49. Question 49 of 50
    49. Question
    2 points

    What two license conditions would be expected on a new Cisco router once the license has been activated? (Choose two.)

    Correct

    Incorrect

    When the show license command is issued, the following information is a sample of what would be found once the license has been activated:
    Index 1 Feature: ipbasek9
    Period left: Life time
    License Type: Permanent
    License State: Active, In Use
    License Count: Non-Counted
    License Priority: Medium
    It is important for a technician to be able to verify an activated IOS 15 license.

    Hint

    When the show license command is issued, the following information is a sample of what would be found once the license has been activated:
    Index 1 Feature: ipbasek9
    Period left: Life time
    License Type: Permanent
    License State: Active, In Use
    License Count: Non-Counted
    License Priority: Medium
    It is important for a technician to be able to verify an activated IOS 15 license.

  50. Question 50 of 50
    50. Question
    1 points

    Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

    Which code is displayed on the web browser?

    Correct

    Incorrect

  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.