Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

CCNA 2 v6 RSE Pretest Exam Online

Last Updated on May 20, 2021 by Admin

CCNA 2 v6 RSE Pretest Exam Online

RSE -- Pretest Exam

Time limit: 0

Quiz-summary

0 of 40 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40

Information

RSE — Pretest Exam

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 40 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  1. Answered
  2. Review
  1. Question 1 of 40
    1. Question
    2 points
    Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)
    Correct

    Incorrect

  2. Question 2 of 40
    2. Question
    1 points
    What is the correct order for PDU encapsulation?
    Correct

    Incorrect

  3. Question 3 of 40
    3. Question
    1 points
    To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?
    Correct

    Incorrect

  4. Question 4 of 40
    4. Question
    1 points
    A small car dealership has a scanner that is attached to the PC of the sales manager. When salesmen need to scan a document, they place the document in the scanner and use their own PCs to control the scanner through software on the PC of the manager. After the document is scanned, they can attach it to an email or upload it into the sales software. What type of network model does this scenario describe?
    Correct

    Incorrect

    In a peer-to-peer network, two or more computers are connected via a network and can share resources (in this case a scanner and files) without having a dedicated server. Every connected end device (known as a peer) can function as both a server and a client. Peer-to-peer networks decentralize the resources on a network. Instead of being stored on dedicated servers, data to be shared can be located on any connected device.

    Hint
    In a peer-to-peer network, two or more computers are connected via a network and can share resources (in this case a scanner and files) without having a dedicated server. Every connected end device (known as a peer) can function as both a server and a client. Peer-to-peer networks decentralize the resources on a network. Instead of being stored on dedicated servers, data to be shared can be located on any connected device.
  5. Question 5 of 40
    5. Question
    1 points
    Which media access method requires that an end device send a notification across the media before sending data?
    Correct

    Incorrect

    Using CSMA/CA as the media access control method, a device will examine the network media. If there is no carrier, the device sends a notification and, if no other device uses the media, it begins to send its data. This method differs from CSMA/CD, where a device will send data once it senses that the media is free, without sending a notification.

    Hint

    Using CSMA/CA as the media access control method, a device will examine the network media. If there is no carrier, the device sends a notification and, if no other device uses the media, it begins to send its data. This method differs from CSMA/CD, where a device will send data once it senses that the media is free, without sending a notification.

  6. Question 6 of 40
    6. Question
    1 points

    Refer to the exhibit. PC1 is configured to obtain a dynamic IP address from the DHCP server. PC1 has been shut down for two weeks. When PC1 boots and tries to request an available IP address, which destination IP address will PC1 place in the IP header?

    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 07
    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 07

    Correct

    Incorrect

    When a host boots and has been configured for dynamic IP addressing, the device tries to obtain a valid IP address. It sends a DHCPDISCOVER message. This is a broadcast message because the DHCP server address is unknown (by design). The destination IP address in the IP header is 255.255.255.255 and the destination MAC address is FF:FF:FF:FF:FF:FF.

    Hint
    When a host boots and has been configured for dynamic IP addressing, the device tries to obtain a valid IP address. It sends a DHCPDISCOVER message. This is a broadcast message because the DHCP server address is unknown (by design). The destination IP address in the IP header is 255.255.255.255 and the destination MAC address is FF:FF:FF:FF:FF:FF.
  7. Question 7 of 40
    7. Question
    1 points
    Which statement is true about IPv6 addresses?
    Correct

    Incorrect

    • Link-local addresses have relevance only on the local link. Routers will not forward packets that have link-local addresses as either the source or destination address.
    • The IPv6 loopback address is ::1/128.
    • Unique local addresses are similar to IPv4 private addresses. There is no broadcast address in the IPv6 protocol.

    Hint
    • Link-local addresses have relevance only on the local link. Routers will not forward packets that have link-local addresses as either the source or destination address.
    • The IPv6 loopback address is ::1/128.
    • Unique local addresses are similar to IPv4 private addresses. There is no broadcast address in the IPv6 protocol.
  8. Question 8 of 40
    8. Question
    1 points

    Refer to the exhibit. Which IP addressing scheme should be changed?

    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 06
    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 06

    Correct

    Incorrect

    Site 2 should have designed the 192.168.2.0/25 network for the 70 hosts. Then the 192.168.2.128/26 network could be used for the 40 hosts, and the 192.168.2.192/27 network could be used for the 15 hosts. The other sites are all valid including Site 4 where the bottom of the addressing range was used for the largest number of hosts.

    Hint
    Site 2 should have designed the 192.168.2.0/25 network for the 70 hosts. Then the 192.168.2.128/26 network could be used for the 40 hosts, and the 192.168.2.192/27 network could be used for the 15 hosts. The other sites are all valid including Site 4 where the bottom of the addressing range was used for the largest number of hosts.
  9. Question 9 of 40
    9. Question
    1 points
    What is the most effective way to mitigate worm and virus attacks?
    Correct

    Incorrect

    Installing the most recent security updates from the operating system vendor on all vulnerable systems is the most effective way to mitigate a worm and virus attacks.

    Hint
    Installing the most recent security updates from the operating system vendor on all vulnerable systems is the most effective way to mitigate a worm and virus attacks.
  10. Question 10 of 40
    10. Question
    1 points
    A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?
    Correct

    Incorrect

  11. Question 11 of 40
    11. Question
    1 points

    Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 05
    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 05

    Correct

    Incorrect

    Telnet accesses a network device through the virtual interface configured with the line VTY command. The password configured under this is required to access the user EXEC mode. The password configured under the line console 0 command is required to gain entry through the console port, and the enable and enable secret passwords are used to allow entry into the privileged EXEC mode.

    Hint
    Telnet accesses a network device through the virtual interface configured with the line VTY command. The password configured under this is required to access the user EXEC mode. The password configured under the line console 0 command is required to gain entry through the console port, and the enable and enable secret passwords are used to allow entry into the privileged EXEC mode.
  12. Question 12 of 40
    12. Question
    1 points
    In performing a protocol analysis of a network, when should traffic be captured to ensure the most accurate representation of the different traffic types on the network?
    Correct

    Incorrect

    To capture traffic that accurately represents all protocols that are running on a network, protocol analysis should take place during times of peak network use.

    Hint
    To capture traffic that accurately represents all protocols that are running on a network, protocol analysis should take place during times of peak network use.
  13. Question 13 of 40
    13. Question
    1 points

    Refer to the exhibit. A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?

    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 04
    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 04

    Correct

    Incorrect

    Because the starting sequence number is 1, and the length of the segment is 305 bytes, the receiving host should return an acknowledgement with an ACK of 306.

    Hint
    Because the starting sequence number is 1, and the length of the segment is 305 bytes, the receiving host should return an acknowledgement with an ACK of 306.
  14. Question 14 of 40
    14. Question
    1 points

    Refer to the exhibit. What is the link-local IPv6 address of the local computer shown based on the output of the netstat -r command?

    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 01
    CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 01

    Correct

    Incorrect

    IPv6 interfaces commonly have two addresses assigned: a link-local address and a global unicast address. Addresses for a link-local address can have hexadecimal numbers in the first hextet ranging from FE80 to FEBF. Global unicast numbers must have the first 3 bits be 001 in the first hextet. The IPv6 addresses that start with 2001 are examples of global unicast addresses.

    Hint
    IPv6 interfaces commonly have two addresses assigned: a link-local address and a global unicast address. Addresses for a link-local address can have hexadecimal numbers in the first hextet ranging from FE80 to FEBF. Global unicast numbers must have the first 3 bits be 001 in the first hextet. The IPv6 addresses that start with 2001 are examples of global unicast addresses.
  15. Question 15 of 40
    15. Question
    1 points
    A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?
    Correct

    Incorrect

    A reconnaissance attack is the unauthorized discovery and mapping of systems, services, or vulnerabilities. One of the most common reconnaissance attacks is performed by using utilities that automatically discover hosts on the networks and determine which ports are currently listening for connections.

    Hint
    A reconnaissance attack is the unauthorized discovery and mapping of systems, services, or vulnerabilities. One of the most common reconnaissance attacks is performed by using utilities that automatically discover hosts on the networks and determine which ports are currently listening for connections.
  16. Question 16 of 40
    16. Question
    1 points
    Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?
    Correct

    Incorrect

    Network Address Translation (NAT) is a technology implemented within IPv4 networks. One application of NAT is to use a few public IP addresses to be shared by many internal network hosts which use private IP addresses. NAT removes the need for public addresses for every internal host. It therefore provides a solution to slow down the IPv4 address depletion.

    Hint
    Network Address Translation (NAT) is a technology implemented within IPv4 networks. One application of NAT is to use a few public IP addresses to be shared by many internal network hosts which use private IP addresses. NAT removes the need for public addresses for every internal host. It therefore provides a solution to slow down the IPv4 address depletion.
  17. Question 17 of 40
    17. Question
    1 points
    What happens when part of an Internet television transmission is not delivered to the destination?
    Correct

    Incorrect

    Most streaming services, such as Internet television, use UDP as the transport layer protocol. These transmissions can tolerate some transmission failures, and no failure messages or retransmissions are required. Such control measures would create noticeable disruption to the flow of data.

    Hint
    Most streaming services, such as Internet television, use UDP as the transport layer protocol. These transmissions can tolerate some transmission failures, and no failure messages or retransmissions are required. Such control measures would create noticeable disruption to the flow of data.
  18. Question 18 of 40
    18. Question
    3 points
    Which three IP addresses are public? (Choose three.)
    Correct

    Incorrect

    The RFC 1918-compliant private addresses are:
    Class A: 10.0.0.0 to 10.255.255.255
    Class B: 172.16.0.0 to 172.31.255.255
    Class C: 192.168.0.0 to 192.168.255.255

    Hint

    The RFC 1918-compliant private addresses are:
    Class A: 10.0.0.0 to 10.255.255.255
    Class B: 172.16.0.0 to 172.31.255.255
    Class C: 192.168.0.0 to 192.168.255.255

  19. Question 19 of 40
    19. Question
    3 points
    A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)
    Correct

    Incorrect

    Intermediary devices provide management of data transmission by keeping track of data pathways, finding alternate pathways when failures occur and notifying other devices, and applying security and priority policies. As they receive data signals, intermediary devices “clean” and retransmit them. Intermediary devices do not create data signals, but rather they utilize network media to interconnect end users.

    Hint
    Intermediary devices provide management of data transmission by keeping track of data pathways, finding alternate pathways when failures occur and notifying other devices, and applying security and priority policies. As they receive data signals, intermediary devices “clean” and retransmit them. Intermediary devices do not create data signals, but rather they utilize network media to interconnect end users.
  20. Question 20 of 40
    20. Question
    1 points
    Which IP address is a valid network address?
    Correct

    Incorrect

    The network address for the device that has the IP address of 172.16.4.255/22 is 172.16.4.0/22. The first valid host address is 172.16.4.1; the last valid host address is 172.16.7.254. The IP address of 172.16.4.32/27 is a network address. Both 172.16.4.79/28 and 172.16.5.255/23 are broadcast addresses.

    Hint
    The network address for the device that has the IP address of 172.16.4.255/22 is 172.16.4.0/22. The first valid host address is 172.16.4.1; the last valid host address is 172.16.7.254. The IP address of 172.16.4.32/27 is a network address. Both 172.16.4.79/28 and 172.16.5.255/23 are broadcast addresses.
  21. Question 21 of 40
    21. Question
    1 points
    What is the range of host IP addresses for the subnet 172.16.1.32/28?
    Correct

    Incorrect

    A /28 subnet has four bits for host addressing. Four bits give sixteen addresses in this subnet, from 172.16.1.32 to 172.16.1.47. However, 172.16.1.32 is the network address and 172.16.1.47 is the broadcast address. Therefore, the valid host range in this subnet is 172.16.1.33 – 172.16.1.46.

    Hint
    A /28 subnet has four bits for host addressing. Four bits give sixteen addresses in this subnet, from 172.16.1.32 to 172.16.1.47. However, 172.16.1.32 is the network address and 172.16.1.47 is the broadcast address. Therefore, the valid host range in this subnet is 172.16.1.33 – 172.16.1.46.
  22. Question 22 of 40
    22. Question
    1 points
    An organization has received the IPv6 network prefix of 2001:db8:1234::/52 from their ISP. How many subnets can be created from this prefix without borrowing bits from the interface ID?
    Correct

    Incorrect

    The IPv6 address space reserves the last 64 bits for the interface ID. Therefore, a prefix of /52 will have 12 bits remaining for subnetting if needed. 12 bits will yield 4096 subnets.

    Hint
    The IPv6 address space reserves the last 64 bits for the interface ID. Therefore, a prefix of /52 will have 12 bits remaining for subnetting if needed. 12 bits will yield 4096 subnets.
  23. Question 23 of 40
    23. Question
    5 points

    Match the application protocols to the correct transport protocols.

    Sort elements
    • FTP
    • HTTP
    • SMTP
    • DHCP
    • TFTP
    • TCP
      • TCP
        • TCP
          • UDP
            • UDP
              Correct

              Incorrect

            • Question 24 of 40
              24. Question
              1 points

              Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.

              What is the secret keyword that is displayed on the web page?

              Correct

              Incorrect

            • Question 25 of 40
              25. Question
              1 points

              Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
              Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?

              Correct

              Incorrect

              The result of the tracert command is as follows:

              1 11 ms 0 ms 0 ms 2001:db8:abc:1::1
              2 4 ms 0 ms 1 ms 2001:db8:abc:5::1
              3 11 ms 14 ms 2 ms 2001:db8:abc:10::15

              It crosses two routers, so the second line is the IP address for the RT2 serial interface0/0/0.

              Hint

              The result of the tracert command is as follows:

              1 11 ms 0 ms 0 ms 2001:db8:abc:1::1
              2 4 ms 0 ms 1 ms 2001:db8:abc:5::1
              3 11 ms 14 ms 2 ms 2001:db8:abc:10::15

              It crosses two routers, so the second line is the IP address for the RT2 serial interface0/0/0.

            • Question 26 of 40
              26. Question
              1 points
              Which statement describes a route that has been learned dynamically?
              Correct

              Incorrect

            • Question 27 of 40
              27. Question
              1 points
              What is the purpose of a routing protocol?
              Correct

              Incorrect

            • Question 28 of 40
              28. Question
              1 points

              Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227?

              CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 03
              CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 03

              Correct

              Incorrect

              After a router determines the destination network by ANDing the destination IP address with the subnet mask, the router examines the routing table for the resulting destination network number. When a match is found, the packet is sent to the interface associated with the network number. When no routing table entry is found for the particular network, the default gateway or gateway of last resort (if configured or known) is used. If there is no gateway of last resort, the packet is dropped. In this instance, the 192.168.12.224 network is not found in the routing table and the router uses the gateway of last resort. The gateway of last resort is the IP address of 209.165.200.226. The router knows this is an IP address that is associated with the 209.165.200.224 network. The router then proceeds to transmit the packet out the Serial0/0/0 interface, or the interface that is associated with 209.165.200.224.

              Hint
              After a router determines the destination network by ANDing the destination IP address with the subnet mask, the router examines the routing table for the resulting destination network number. When a match is found, the packet is sent to the interface associated with the network number. When no routing table entry is found for the particular network, the default gateway or gateway of last resort (if configured or known) is used. If there is no gateway of last resort, the packet is dropped. In this instance, the 192.168.12.224 network is not found in the routing table and the router uses the gateway of last resort. The gateway of last resort is the IP address of 209.165.200.226. The router knows this is an IP address that is associated with the 209.165.200.224 network. The router then proceeds to transmit the packet out the Serial0/0/0 interface, or the interface that is associated with 209.165.200.224.
            • Question 29 of 40
              29. Question
              1 points
              Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?
              Correct

              Incorrect

              There are four basic types of static routes. Floating static routes are backup routes that are placed into the routing table if a primary route is lost. A summary static route aggregates several routes into one, reducing the of the routing table. Standard static routes are manually entered routes into the routing table. Default static routes create a gateway of last resort.

              Hint
              There are four basic types of static routes. Floating static routes are backup routes that are placed into the routing table if a primary route is lost. A summary static route aggregates several routes into one, reducing the of the routing table. Standard static routes are manually entered routes into the routing table. Default static routes create a gateway of last resort.
            • Question 30 of 40
              30. Question
              2 points
              Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.)
              Correct

              Incorrect

              There are several factors to consider when selecting a routing protocol to implement. Two of them are scalability and speed of convergence. The other options are irrelevant.

              Hint
              There are several factors to consider when selecting a routing protocol to implement. Two of them are scalability and speed of convergence. The other options are irrelevant.
            • Question 31 of 40
              31. Question
              1 points
              Which information does a switch use to populate the MAC address table?
              Correct

              Incorrect

              To maintain the MAC address table, the switch uses the source MAC address of the incoming packets and the port that the packets enter. The destination address is used to select the outgoing port.

              Hint
              To maintain the MAC address table, the switch uses the source MAC address of the incoming packets and the port that the packets enter. The destination address is used to select the outgoing port.
            • Question 32 of 40
              32. Question
              1 points
              Employees of a company connect their wireless laptop computers to the enterprise LAN via wireless access points that are cabled to the Ethernet ports of switches. At which layer of the three-layer hierarchical network design model do these switches operate?
              Correct

              Incorrect

            • Question 33 of 40
              33. Question
              1 points
              Which advantage does the store-and-forward switching method have compared with the cut-through switching method?
              Correct

              Incorrect

              A switch using the store-and-forward switching method performs an error check on an incoming frame by comparing the FCS value against its own FCS calculations after the entire frame is received. In comparison, a switch using the cut-through switching method makes quick forwarding decisions and starts the forwarding process without waiting for the entire frame to be received. Thus a switch using cut-through switching may send invalid frames to the network. The performance of store-and-forward switching is slower compared to cut-through switching performance. Collision detection is monitored by the sending device. Store-and-forward switching does not use IPv4 Layer 3 and 4 information for its forwarding decisions.

              Hint
              A switch using the store-and-forward switching method performs an error check on an incoming frame by comparing the FCS value against its own FCS calculations after the entire frame is received. In comparison, a switch using the cut-through switching method makes quick forwarding decisions and starts the forwarding process without waiting for the entire frame to be received. Thus a switch using cut-through switching may send invalid frames to the network. The performance of store-and-forward switching is slower compared to cut-through switching performance. Collision detection is monitored by the sending device. Store-and-forward switching does not use IPv4 Layer 3 and 4 information for its forwarding decisions.
            • Question 34 of 40
              34. Question
              1 points
              Which type of traffic is designed for a native VLAN?
              Correct

              Incorrect

              A native VLAN carries untagged traffic, which is traffic that does not come from a VLAN. A data VLAN carries user-generated traffic. A management VLAN carries management traffic.

              Hint
              A native VLAN carries untagged traffic, which is traffic that does not come from a VLAN. A data VLAN carries user-generated traffic. A management VLAN carries management traffic.
            • Question 35 of 40
              35. Question
              3 points
              A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.)
              Correct

              Incorrect

              To enable the remote management access, the Cisco switch must be configured with an IP address and a default gateway. In addition, vty lines must configured to enable either Telnet or SSH connections. A loopback address, default VLAN, and VTP domain configurations are not necessary for the purpose of remote switch management.

              Hint
              To enable the remote management access, the Cisco switch must be configured with an IP address and a default gateway. In addition, vty lines must configured to enable either Telnet or SSH connections. A loopback address, default VLAN, and VTP domain configurations are not necessary for the purpose of remote switch management.
            • Question 36 of 40
              36. Question
              1 points
              What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process?
              Correct

              Incorrect

              The DHCPREQUEST message is broadcast to inform other DHCP servers that an IP address has been leased.

              Hint
              The DHCPREQUEST message is broadcast to inform other DHCP servers that an IP address has been leased.
            • Question 37 of 40
              37. Question
              1 points
              What is the most likely scenario in which the WAN interface of a router would be configured as a DHCP client to be assigned a dynamic IP address from an ISP?
              Correct

              Incorrect

              SOHO and home broadband routers are typically set to acquire an IPv4 address automatically from the ISP. The IP address that is assigned is typically a dynamic address to reduce the cost, but a static IP address is possible with more cost. However, if the router is assigned a dynamic IP address, DNS issues will result in the web server behind the router not being easily accessible to the public. Routers are typically also gateways for LANs, but this has no bearing on whether the router is configured as a DHCP client on its WAN link or not. Likewise, a router can be configured to be a DHCP client in order to obtain an IP address from the ISP, but at the same time, it can be configured as a DHCP server to serve the IP addressing for the devices on its LAN.

              Hint
              SOHO and home broadband routers are typically set to acquire an IPv4 address automatically from the ISP. The IP address that is assigned is typically a dynamic address to reduce the cost, but a static IP address is possible with more cost. However, if the router is assigned a dynamic IP address, DNS issues will result in the web server behind the router not being easily accessible to the public. Routers are typically also gateways for LANs, but this has no bearing on whether the router is configured as a DHCP client on its WAN link or not. Likewise, a router can be configured to be a DHCP client in order to obtain an IP address from the ISP, but at the same time, it can be configured as a DHCP server to serve the IP addressing for the devices on its LAN.
            • Question 38 of 40
              38. Question
              1 points
              Which type of traffic would most likely have problems when passing through a NAT device?
              Correct

              Incorrect

              IPsec protocols often perform integrity checks on packets when they are received to ensure that they have not been changed in transit from the source to the destination. Because NAT changes values in the headers as packets pass from inside to outside, these integrity checks can fail, thus causing the packets to be dropped at the destination.

              Hint
              IPsec protocols often perform integrity checks on packets when they are received to ensure that they have not been changed in transit from the source to the destination. Because NAT changes values in the headers as packets pass from inside to outside, these integrity checks can fail, thus causing the packets to be dropped at the destination.
            • Question 39 of 40
              39. Question
              1 points

              Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message?

              CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 02
              CCNA 2 RSE 6.0 Pretest Exam Answers 2018 2019 02

              Correct

              Incorrect

              The number 5 in the message output %SYS-5-CONFIG_I, indicated this is a notification level message that is for normal but significant conditions.

              Hint
              The number 5 in the message output %SYS-5-CONFIG_I, indicated this is a notification level message that is for normal but significant conditions.
            • Question 40 of 40
              40. Question
              2 points
              Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)
              Correct

              Incorrect

              Static routes are manually configured on a router. Static routes are not automatically updated and must be manually reconfigured if the network topology changes. Thus static routing improves network security because it does not make route updates among neighboring routers. Static routes also improve resource efficiency by using less bandwidth, and no CPU cycles are used to calculate and communicate routes.

              Hint
              Static routes are manually configured on a router. Static routes are not automatically updated and must be manually reconfigured if the network topology changes. Thus static routing improves network security because it does not make route updates among neighboring routers. Static routes also improve resource efficiency by using less bandwidth, and no CPU cycles are used to calculate and communicate routes.
            • CCNA1 v7
            • CCNA2 v7
            • CCNA3 v7
            System Test Exam Answers
            Modules 1 – 3 Exam Answers
            Modules 4 – 7 Exam Answers
            Modules 8 – 10 Exam Answers
            Modules 11 – 13 Exam Answers
            Modules 14 – 15 Exam Answers
            Modules 16 – 17 Exam Answers
            Practice Final – ITN Answers
            Course Feedback
            ITN Practice PT Skills Assessment (PTSA)
            Final Exam Answers
            Modules 1 – 4 Exam Answers
            Modules 5 – 6 Exam Answers
            Modules 7 – 9 Exam Answers
            Modules 10 – 13 Exam Answers
            Modules 14 – 16 Exam Answers
            ITN Practice Skills Assessment – PT Answers
            SRWE Practice Skills Assessment – PT Part 1 Answers
            SRWE Practice Skills Assessment – PT Part 2 Answers
            SRWE Hands On Skills Exam Answers
            SRWE Practice Final Exam Answers
            SRWE Final Exam Answers 
            Modules 1 – 2 Exam Answers
            Modules 3 – 5 Exam Answers
            Modules 6 – 8 Exam Answers
            Modules 9 – 12 Exam Answers
            Modules 13 – 14 Exam Answers
            ITN Practice PT Skills Assessment (PTSA) Answers
            SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
            SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
            ENSA Practice PT Skills Assessment (PTSA) Answers
            ENSA Hands On Skills Exam Answers
            Practice Final – ENSA Answers
            ENSA Final Exam Answers
            CCNA Certification Practice Exam Answers

            Copyright © 2023 PressExam.