Training Exam
Training Exam
Training Exam
Which command prevents passwords from being stored in the configuration as plaintext on a
router or switch?
A. enable secret
B. service password-encryption
C. username Cisco password encrypt
D. enable password
4. Which two protocols must be disabled to increase security for management connections to a
Wireless LAN Controller? (Choose two)
A. Telnet
B. SSH
C. HTTP
D. HTTPS
E. TFTP
6. What is the difference in data transmission delivery and reliability between TCP and UDP?
A. TCP transmits data at a higher rate and ensures packet delivery. UDP retransmits lost data to
ensure applications receive the data
on the remote end.
B. UDP sets up a connection between both devices before transmitting data. TCP uses the three-
way handshake to transmit data with
a reliable connection
C. UDP is used for multicast and broadcast communication. TCP is used for unicast
communication and transmits data at a higher rate
with error checking.
D. TCP requires the connection to be established before transmitting data. UDP transmits data at
a higher rate without ensuring packet
delivery.
7. What are two benefits of using the PortFast feature? (Choose two)
A. Enabled interfaces are automatically placed in listening state
B. Enabled interfaces come up and move to the forwarding state immediately
C. Enabled interfaces never generate topology change notifications.
D. Enabled interfaces that move to the learning state generate switch topology change
notifications
E. Enabled interfaces wait 50 seconds before they move to the forwarding state
9. What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two.)
A. Both operate at a frequency of 500 MHz.
B. Both support runs of up to 55 meters.
C. Both support runs of up to 100 meters
D. Both support speeds of at least 1 Gigabit
E. Both support speeds up to 10 Gigabit
10. A network administrator must to configure SSH for remote access to router R1 The
requirement is to use a public and private key pair
to encrypt management traffic to and from the connecting client. Which configuration, when
applied, meets the requirements?
A. R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate ec keysize 2048
B. R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate rsa modulus 1024
C. R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key generate ec keysize 1024
D. R1#enable
R1#configure terminal
R1(config)#ip domain-name cisco.com
R1(config)#crypto key encrypt rsa name myKey
12. Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?
A. ARP
B. DHCP
C. CDP
D. DNS
13. When DHCP is configured on a router, which command must be entered so the default
gateway is automatically distributed?
A. default-router
B. default-gateway
C. ip helper-address
D. dns-server
17. A network analyst is tasked with configuring the date and time on a router using EXEC
mode.The date must be set to January 1,2020
and the time must be set to 12:00 am.what command should be used?
A. clock timezone
B. clock summer-time date
C. clock set
D. clock summer-time recurring
18. What are two roles of Domain Name Services (DNS)? (Choose Two)
A. builds a flat structure of DNS names for more efficient IP operations
B. encrypts network Traffic as it travels across a WAN by default
C. improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
D. enables applications to identify resources by name instead of IP address
E. allows a single host name to be shared across more than one IP address
19. The SW1 interface g0/1 is in the down/down state.which two configurations are valid reasons for the interface
conditions?(choose two)
A. There is a duplex mismatch
B. There is a speed mismatch
C. There is a protocol mismatch
D. The interface is shut down
E. The interface is error-disabled
20. What are two reasons for an engineer to configure a floating static route? (Choose two.)
A. to route traffic differently based on the source IP of the packet
B. to enable fallback static routing when the dynamic routing protocol fails
C. to automatically route traffic on a secondary path when the primary path goes down
D. to control the return path of traffic that is sent from the router
E. to support load balancing via static routing
22. Refer to Exhibit. Which action do the switches take on the trunk link?
A. The trunk does not form and the ports go into an err-disabled status.
B. The trunk forms but the mismatched native VLANs are merged into a single broadcast
domain.
C. The trunk does not form, but VLAN 99 and VLAN 999 are allowed to traverse the link.
D. The trunk forms but VLAN 99 and VLAN 999 are in a shutdown state.
23. Refer to the Exhibit. After the switch configuration the ping test fails between PC A and PC
B Based on the output for switch 1. Which
error must be corrected?
A. There is a native VLAN mismatch
B. Access mode is configured on the switch ports.
C. The PCs are m the incorrect VLAN
D. All VLANs are not enabled on the trunk
24. What are two differences between optical-fiber cabling and copper cabling? (Choose two.)
A. Fiber connects to physical interfaces using RJ-45 connections.
B. The data can pass through the cladding.
C. Light is transmitted through the core of the fiber.
D. The glass core component is encased in a cladding.
E. A BNC connector is used for fiber connections.
25. The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and
Switch 2 while all other VLANs are to remain
tagged. Which command accomplishes this task?
A. switchport access vlan 67
B. switchport trunk allowed vlan 67
C. switchport private-vlan association host 67
D. switchport trunk native vlan 67
26. Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose
two)
A. The switch must be running a k9 (crypto) IOS image
B. The ip domain-name command must be configured on the switch
C. IP routing must be enabled on the switch
D. A console password must be configured on the switch
E. Telnet must be disabled on the switch
27. Which configuration is needed to generate an RSA key for SSH on a router?
A. Configure the version of SSH
B. Configure VTY access.
C. Create a user with a password
D. Assign a DNS domain name
28. What are two descriptions of three-tier network topologies? (Choose two.)
A. The distribution layer runs Layer 2 and Layer 3 technologies.
B. The network core is designed to maintain continuous connectivity when devices fail.
C. The core layer maintains wired connections for each host.
D. The core and distribution layers perform the same functions
E. The access layer manages routing between devices in different domains.
29. How do TCP and UDP differ in the way that they establish a connection between two endpoints?
A. TCP use the three-way handshake,and UDP dose no guarantee message delivery
B. TCP use synchronization packets,and UDP uses acknowledgement packets
C. UDP provides reliable message transfer,and TCP is a connectionless protocol.
D. UDP use SYN,SYN ACK,and FIN bits in the frame header while TCP uses SYN,SYN ACK,and ACK bis.
30. A network engineer must create a diagram of a multivendor network.which command must be configured on the
Cisco devices so that the topology of the network
can be mapped?
A. Device(config)#lldp run
B. Device(config)#cdp run
C. Device(config)# cdp enable
D. Device(config)# flow-sampler-map topology