CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 – 100% Full

New Version:

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory?

  • flash
  • NVRAM
  • RAM
  • ROM

RAM provides temporary storage for the running IOS, the running configuration file, the IP routing table, ARP table, and buffers for packet processing. In contrast, permanent storage of the IOS is provided by flash. NVRAM provides permanent storage of the startup configuration file, and ROM.provides permanent storage of the router bootup instructions and a limited IOS.

2. Refer to the exhibit. A company has an internal network of 192.168.10.0/24 for their employee workstations and a DMZ network of 192.168.3.0/24 to host servers. The company uses NAT when inside hosts connect to outside network. A network administrator issues the show ip nat translations command to check the NAT configurations. Which one of source IPv4 addresses is translated by R1 with PAT
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 1

  • 10.0.0.31
  • 192.168.3.5
  • 192.168.3.33
  • 192.168.10.35
  • 172.16.20.5

3. Refer to the exhibit. This network has two connections to the ISP, one via router C and one via router B. The serial link between router A and router C supports EIGRP and is the primary link to the Internet. If the primary link fails, the administrator needs a floating static route that avoids recursive route lookups and any potential next-hop issues caused by the multiaccess nature of the Ethernet segment with router B. What should the administrator configure?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 2

  • Create a static route pointing to Fa0/0 with an AD of 1.
  • Create a static route pointing to 10.1.1.1 with an AD of 95.
  • Create a static route pointing to 10.1.1.1 with an AD of 1.
  • Create a fully specified static route pointing to Fa0/0 with an AD of 1.
  • Create a fully specified static route pointing to Fa0/0 with an AD of 95.

4. Which type of inter-VLAN communication design requires the configuration of multiple subinterfaces?

  • legacy inter-VLAN routing
  • routing for the management VLAN
  • router on a stick
  • routing via a multilayer switch

Explanation: The router-on-a-stick design always includes subinterfaces on a router. When a multilayer switch is used, multiple SVIs are created. When the number of VLANs equals the number of ports on a router, or when the management VLAN needs to be routed, any of the inter-VLAN design methods can be used.

5. After sticky learning of MAC addresses is enabled, what action is needed to prevent dynamically learned MAC addresses from being lost in the event that an associated interface goes down?

  • Reboot the switch.
  • Copy the running configuration to the startup configuration.
  • Shut down the interface then enable it again with the no shutdown command.
  • Configure port security for violation protect mode.

When sticky learning is enabled, dynamically learned MAC addresses are stored in the running configuration in RAM and will be lost if the switch is rebooted or an interface goes down. To prevent the loss of learned MAC addresses, an administrator can save the running configuration into the startup configuration in NVRAM.

6. A network technician is configuring port security on switches. The interfaces on the switches are configured in such a way that when a violation occurs, packets with unknown source addresses are dropped and no notification is sent. Which violation mode is configured on the interfaces?

  • off
  • restrict
  • protect
  • shutdown

7. A technician is configuring a switch to allow access both to IP phones and to PCs on interface Fa0/12. The technician enters the interface command mls qos trust cos. What is the reason for including that command?

  • It is used in conjuction with STP PortFast to ensure that interface Fa0/12, in case of a shutdown, regains an “up” state immediately.
  • It is used to verify service levels and to ensure that congestion over serial interfaces is minimized for voice traffic.
  • It is used to set the trusted state of an interface to allow classification of traffic for QoS based on the CoS value of the IP phone.
  • It is used to provide higher categories of security for voice and video traffic.

The class of service (CoS) value is a number placed inside a field in the 802.1Q or ISL trunking header and used for prioritizing traffic and providing quality of service (QoS). The mls qos trust cos command is used when a VoIP phone attaches to a Cisco switch and QoS is implemented.

8. What is the minimum configuration for a router interface that is participating in IPv6 routing?

  • to have only a link-local IPv6 address
  • to have both a link-local and a global unicast IPv6 address
  • to have both an IPv4 and an IPv6 address
  • to have a self-generated loopback address
  • to have only an automatically generated multicast IPv6 address

With IPv6, a router interface typically has more than one IPv6 address. The router will at least have a link-local address that can be automatically generated, but the router commonly has an global unicast address also configured.

9. Refer to the exhibit. Assuming that the routing tables are up to date and no ARP messages are needed, after a packet leaves H1, how many times is the L2 header rewritten in the path to H2?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 3

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

H1 creates the first Layer 2 header. The R1 router has to examine the destination IP address to determine how the packet is to be routed. If the packet is to be routed out another interface, as is the case with R1, the router strips the current Layer 2 header and attaches a new Layer 2 header. When R2 determines that the packet is to be sent out the LAN interface, R2 removes the Layer 2 header received from the serial link and attaches a new Ethernet header before transmitting the packet.

10. What command will enable a router to begin sending messages that allow it to configure a link-local address without using an IPv6 DHCP server?

  • a static route
  • the ipv6 route ::/0 command
  • the ipv6 unicast-routing command
  • the ip routing command

To enable IPv6 on a router you must use the ipv6 unicast-routing global configuration command or use the ipv6 enable interface configuration command. This is equivalent to entering ip routing to enable IPv4 routing on a router when it has been turned off. Keep in mind that IPv4 is enabled on a router by default. IPv6 is not enabled by default.

11. Which switching method provides error-free data transmission?

  • fragment-free
  • fast-forward
  • integrity-checking
  • store-and-forward

12. Which problem is evident if the show ip interface command shows that the interface is down and the line protocol is down?

  • A cable has not been attached to the port.
  • There is an IP address conflict with the configured address on the interface.
  • The no shutdown command has not been issued on the interface.
  • An encapsulation mismatch has occurred.

If an interface has not been brought up with the no shutdown command, the interface status shows administratively down. A duplicate IP address will not bring an interface down. An encapsulation error is normally found using the show interfaces command.

13. A company security policy requires that all MAC addressing be dynamically learned and added to both the MAC address table and the running configuration on each switch. Which port security configuration will accomplish this?

  • auto secure MAC addresses
  • dynamic secure MAC addresses
  • static secure MAC addresses
  • sticky secure MAC addresses

With sticky secure MAC addressing, the MAC addresses can be either dynamically learned or manually configured and then stored in the address table and added to the running configuration file. In contrast, dynamic secure MAC addressing provides for dynamically learned MAC addressing that is stored only in the address table.

14. Refer to the exhibit. A small business uses VLANs 8, 20, 25, and 30 on two switches that have a trunk link between them. What native VLAN should be used on the trunk if Cisco best practices are being implemented?

CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 4

  • 1
  • 5
  • 8
  • 20
  • 25
  • 30

Cisco recommends using a VLAN that is not used for anything else for the native VLAN. The native VLAN should also not be left to the default of VLAN 1. VLAN 5 is the only VLAN that is not used and not VLAN 1.

15. A network administrator is configuring an ACL with the command access-list 10 permit 172.16.32.0 0.0.15.255. Which IPv4 address matches the ACE?

  • 172.16.20.2
  • 172.16.26.254
  • 172.16.45.2
  • 172.16.48.5

With the wildcard mask of 0.0.15.255, the IPv4 addresses that match the ACE are in the range of 172.16.32.0 to 172.16.47.255.

16. The PT initialization was skipped. You will not be able to view the PT activity.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.
Which code is displayed on the web browser?

  • Inter-VLANonfigured!
  • It works!
  • Welldone!
  • Grea

17. Which command is issued in the VTY line configuration mode to apply a standard ACL that will control Telnet access to a router?

  • access-group 11 in
  • access-class 11 in
  • access-list 11 in
  • access-list 110 in

The access-class 11 in command applies a standard ACL to the VTY lines of a router to control Telnet and SSH access. The access-group 11 in command would be issued on a router interface to apply an ACL, and because it applies a standard ACL, all IP traffic will be filtered, not just Telnet and SSH communications bound for the VTY lines. The access-list command creates the access control expressions of an ACL but do not apply the ACl to a router interface or line.

18. Which series of commands will cause access list 15 to restrict Telnet access on a router?

  • R1(config)# line vty 0 4
    R1(config​-line)# ip access-group 15 in
  • R1(config)# int gi0/0
    R1(config​-if)# ip access-group 15 in
  • R1(config)# line vty 0 4
    R1(config​-line)# access-class 15 in
  • R1(config)# int gi0/0
    R1(config​-if)# access-class 15 in

Once an access list to restrict Telnet or SSH access has been created, it is applied to the vty lines with the access-class command. This will restrict Telnet or SSH access.

19. Which three statements accurately describe VLAN types? (Choose three).

  • A management VLAN is any VLAN that is configured to access management features of the switch.
  • A data VLAN is used to carry VLAN management data and user-generated traffic.
  • Voice VLANs are used to support user phone and e-mail traffic on a network.
  • VLAN 1 is always used as the management VLAN.
  • After the initial boot of an unconfigured switch, all ports are members of the default VLAN.
  • An 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic.

Explanation: A management VLAN is a VLAN that is configured to manage features of the switch. By default, all ports are members of the default VLAN. An 802.1Q trunk port supports both tagged and untagged traffic.

20. A client is using SLAAC to obtain an IPv6 address for its interface. After an address has been generated and applied to the interface, what must the client do before it can begin to use this IPv6 address?

  • It must send a DHCPv6 INFORMATION-REQUEST message to request the address of the DNS server.
  • It must send an ICMPv6 Router Solicitation message to determine what default gateway it should use.
  • It must send a DHCPv6 REQUEST message to the DHCPv6 server to request permission to use this address.
  • It must send an ICMPv6 Neighbor Solicitation message to ensure that the address is not already in use on the network.

Stateless DHCPv6 or stateful DHCPv6 uses a DHCP server, but Stateless Address Autoconfiguration (SLAAC) does not. A SLAAC client can automatically generate an address that is based on information from local routers via Router Advertisement (RA) messages. Once an address has been assigned to an interface via SLAAC, the client must ensure via Duplicate Address Detection (DAD) that the address is not already in use. It does this by sending out an ICMPv6 Neighbor Solicitation message and listening for a response. If a response is received, then it means that another device is already using this address.

21. Which DHCP IPv4 message contains the following information?
Destination address: 255.255.255.255
Client IPv4 address: 0.0.0.0
Default gateway address: 0.0.0.0
Subnet mask: 0.0.0.0

  • DHCPACK
  • DHCPDISCOVER
  • DHCPOFFER
  • DHCPREQUEST

A client will first send the DHCPDISCOVER broadcast message to find DHCPv4 servers on the network. This message will have the limited broadcast address, 255.255.255.255, as the destination address. The client IPv4 address, the default gateway address, and subnet fields will all be 0.0.0.0 because these have not yet been configured on the client. When the DHCPv4 server receives a DHCPDISCOVER message, it reserves an available IPv4 address to lease to the client and sends the unicast DHCPOFFER message to the requesting client. When the client receives the DHCPOFFER from the server, it sends back a DHCPREQUEST broadcast message. On receiving the DHCPREQUEST message, the server replies with a unicast DHCPACK message.

22. A network administrator is implementing DHCPv6 for the company. The administrator configures a router to send RA messages with M flag as 1 by using the interface command ipv6 nd managed-config-flag. What effect will this configuration have on the operation of the clients?

  • Clients must use the information that is contained in RA messages.
  • Clients must use all configuration information that is provided by a DHCPv6 server.
  • Clients must use the prefix and prefix length that are provided by RA messages and obtain additional information from a DHCPv6 server.
  • Clients must use the prefix and prefix length that are provided by a DHCPv6 server and generate a random interface ID.

Under stateful DHCPv6 configuration, which is indicated by setting M flag as 1 (through the interface command ipv6 nd managed-config-flag), the dynamic IPv6 address assignments are managed by the DHCPv6 server. Clients must obtain all configuration information from a DHCPv6 server.

23. Refer to the exhibit. The users on the LAN network of R1 cannot receive an IPv6 address from the configured stateful DHCPv6 server. What is missing from the stateful DHCPv6 configuration on router R1?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 5

  • The FA0/0 interface is missing the command that informs the clients to use stateful DHCPv6.
  • IPv6 has not been enabled globally on router R1.
  • The DHCPv6 pool has not been bound to the LAN interface.
  • The DHCPv6 pool does not match the IPv6 address configured on interface FA0/0.

When configuring a router interface for stateful DHCPv6, the router must be able to inform the host PC’s to receive IPv6 addressing from a stateful DHCPv6 server. The interface command is ipv6 nd managed-config-flag

24. Refer to the exhibit. NAT is configured on R1 and R2. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between R2 and the web server?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 6

  • 10.130.5.76
  • 209.165.200.245
  • 172.16.1.10
  • 203.0.113.5
  • 192.0.2.1
  • 172.16.1.1

Because the packet is between R2 and the web server, the source IP address is the inside global address of PC, 209.165.200.245.

25. Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 7

  • NAT-POOL2 is not bound to ACL 1.
  • Interface Fa0/0 should be identified as an outside NAT interface.
  • The NAT pool is incorrect.
  • Access-list 1 is misconfigured.

R1 has to have NAT-POOL2 bound to ACL 1. This is accomplished with the command R1(config)#ip nat inside source list 1 pool NAT-POOL2. This would enable the router to check for all interesting traffic and if it matches ACL 1 it would be translated by use of the addresses in NAT-POOL2.

26. A network engineer is configuring PAT on a router and has issued the command:

ip nat source list 1 interface serial 0/1/0 overload

Which additional command is required to specify addresses from the 192.168.128.0/18 network as the inside local addresses?

  • ip nat inside source list 1 pool INSIDE_NAT_POOL
  • access-list 1 permit 192.168.128.0 0.0.127.255
  • access-list 1 permit 192.168.128.0 255.255.192.0
  • access-list 1 permit 192.168.128.0 0.0.63.255
  • ip nat inside source static 192.168.128.0 209.165.200.254

A standard access list with the appropriate wildcard mask specifies the inside local addresses to be translated. The ip nat inside source list 1 pool NAT_POOL command configures NAT to use a pool of outside global addresses, not a single outside interface address as required. The ip nat inside source static 192.168.128.0 209.165.200.254 command configures one-to-one static NAT, not PAT as the overload keyword specifies.

27. Refer to the exhibit. If the IP addresses of the default gateway router and the DNS server are correct, what is the configuration problem?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 8

  • The DNS server and the default gateway router should be in the same subnet.
  • The IP address of the default gateway router is not contained in the excluded address list.
  • The default-router and dns-server commands need to be configured with subnet masks.
  • The IP address of the DNS server is not contained in the excluded address list.

In this configuration, the excluded address list should include the address that is assigned to the default gateway router. So the command should be ip dhcp excluded-address 192.168.10.1 192.168.10.9.

28. Fill in the blank.
In IPv6, all routes are level ___ ultimate routes.Correct Answer: 1*

IPv6 is classless by design, making all routes level 1 ultimate routes by default.

29. Fill in the blank.
The acronym ___ describes the type of traffic that requires a separate VLAN, strict QoS requirements, and a one-way overall delay less than 150 ms across the network. These restrictions help to ensure traffic quality.Correct Answer: voip*

VoIP traffic tends to have a separate VLAN to ensure that voice quality is maintained. VoIP traffic requires:
assured bandwidth to ensure voice quality
transmission priority over other types of network traffic
ability to be routed around congested areas on the network
delay of less than 150 ms across the network

30. Refer to the exhibit. A network administrator has just configured address translation and is verifying the configuration. What three things can the administrator verify? (Choose three.)
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 9

  • Address translation is working.
  • Three addresses from the NAT pool are being used by hosts.
  • The name of the NAT pool is refCount.
  • A standard access list numbered 1 was used as part of the configuration process.
  • Two types of NAT are enabled.
  • One port on the router is not participating in the address translation.

The show ip nat statistics, show ip nat translations, and debug ip nat commands are useful in determining if NAT is working and and also useful in troubleshooting problems that are associated with NAT. NAT is working, as shown by the hits and misses count. Because there are four misses, a problem might be evident. The standard access list numbered 1 is being used and the translation pool is named NAT as evidenced by the last line of the output. Both static NAT and NAT overload are used as seen in the Total translations line.

31. Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

  • NVRAM
  • nearest syslog server
  • console
  • RAM

Syslog messages for Cisco routers and switches can be sent to memory, the console, a tty line, or to a syslog server.

32. Which requirement should be checked before a network administrator performs an IOS image upgrade on a router?

  • The desired IOS image file has been downloaded to the router.
  • There is sufficient space in flash memory.
  • The old IOS image file has been deleted.
  • The FTP server is operational.

Before an upgrade process starts, the user must make sure that there is sufficient space in the flash to host the new IOS image file. An old IOS file does not have to be deleted as long as there is sufficient space available for the new IOS file. FTP is not supported for the IOS upgrading process. Instead, a TFTP server is used. The new IOS image should be downloaded and loaded to the TFTP server.

33. A network administrator configures a router with the command sequence:

R1(config)# boot system tftp://c1900-universalk9-mz.SPA.152-4.M3.bin
R1(config)# boot system rom

What is the effect of the command sequence?

  • The router will load IOS from the TFTP server. If the image fails to load, it will load the IOS image from ROM.
  • The router will search and load a valid IOS image in the sequence of flash, TFTP, and ROM.
  • The router will copy the IOS image from the TFTP server and then reboot the system.
  • On next reboot, the router will load the IOS image from ROM.

The boot system command is a global configuration command that allows the user to specify the source for the Cisco IOS Software image to load. In this case, the router is configured to boot from the IOS image that is stored on the TFTP server and will use the ROMmon imagethat is located in the ROM if it fails to locate the TFTP server or fails to load a valid image from the TFTP server.

34. Which three software packages are available for Cisco IOS Release 15.0?

  • Unified Communications
  • DATA
  • Enterprise Services
  • Advanced IP Services
  • IPVoice
  • Security

Cisco IOS Release 15.0 has four available technology software packages.
IPBase
DATA
Unified Communications
Security

35. What two license states would be expected on a new Cisco router once the license has been activated? (Choose two.)

  • License State: Active, In Use
  • License State: Active, Registered
  • License Type: ipbasek9
  • License Type: Temporary
  • License State: On
  • License Type: Permanent

When the show license command is issued, the following information is a sample of what would be found once the license has been activated:
Index 1 Feature: ipbasek9
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
It is important for a technician to be able to verify an activated IOS 15 license.

36. Which type of static route typically uses the distance parameter in the ip route global configuration command?

  • summary static route
  • default static route
  • floating static route
  • standard static route

Because a floating static route is not designed to be used as a primary route, its configuration requires a higher administrative distance than the usual default value of 1. When set higher than the administrative distance for the current routing protocol, the distance parameter allows the route to be used only when the primary route fails. All other forms of static routes have specific uses as primary routes.

37. Refer to the exhibit. Which type of IPv6 static route is configured in the exhibit?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 10

  • fully specified static route
  • recursive static route
  • directly attached static route
  • floating static route

The route provided points to another address that must be looked up in the routing table. This makes the route a recursive static route.

38. Refer to the exhibit. Which route was configured as a static route to a specific network using the next-hop address?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 11

  • C 192.168.2.0/24 is directly connected, Serial0/0/0
  • S 0.0.0.0/0 [1/0] via 192.168.2.2
  • S 10.0.2.0/24 [1/0] via 192.168.2.2
  • S 10.0.2.0/24 is directly connected, Serial 0/0/0

The C in a routing table indicates an interface that is up and has an IP address assigned. The S in a routing table signifies that a route was installed using the ip route command. Two of the routing table entries shown are static routes to a specific destination (the 10.0.2.0 network). The entry that has the S denoting a static route and [1/0] was configured using the next-hop address. The other entry (S 10.0.2.0/24 is directly connected, Serial 0/0/0) is a static route configured using the exit interface. The entry with the 0.0.0.0 route is a default static route which is used to send packets to any destination network that is not specifically listed in the routing table.

39. A network administrator has entered the following command:

ip route 192.168.10.64 255.255.255.192 serial0/0/1

When the network administrator enters the command show ip route, the route is not in the routing table. What should the administrator do next?

  • Re-enter the command using a network number rather than a usable IP address.
  • Verify that the serial 0/0/1 interface is active and available.
  • Re-enter the command using the correct mask.
  • Verify that the 192.168.10.64 network is active within the network infrastructure.

The reason that a correctly typed static network would not go into the routing table is if the exit interface is not available. The 192.168.10.64 is a valid network number and that route does not have to be “up and up” in order for a static route to be configured on a remote router.

40. Refer to the exhibit. How did the router obtain the last route that is shown?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 12

  • The ip route command was used.
  • The ipv6 route command was used.
  • Another router in the same organization provided the default route by using a dynamic routing protocol.
  • The ip address interface configuration mode command was used in addition to the network routing protocol configuration mode command.

A default route is presented in EIGRP with an asterisk (*) and the 0.0.0.0/0 entry. The route was learned through EIGRP and the Serial0/0/1 interface on the router.

41. To enable RIP routing for a specific subnet, the configuration command network 192.168.5.64 was entered by the network administrator. What address, if any, appears in the running configuration file to identify this network?

  • 192.168.5.64
  • 192.168.5.0
  • 192.168.0.0
  • No address is displayed.

RIP is a classful routing protocol, meaning it will automatically convert the subnet ID that was entered into the classful address of 192.168.5.0 when it is displayed in the running configuration.

42. Refer to the exhibit. What is the administrative distance value that indicates the route for R2 to reach the 10.10.0.0/16 network?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 13

  • 1
  • 120
  • 0
  • 2

Router 2 is using a static route to reach network 10.10.0.0 and static routes have an administrative distance of 1.

43. Refer to the exhibit. Which type of route is 172.16.0.0/16?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 14

  • ultimate route
  • level 1 parent route
  • child route
  • default route

A level 1 parent route displays the classful network address, the number of subnets, and the number of different subnet masks that the classful address has been subdivided into. It does not have an exit interface. A child route, ultimate route, and default route all have exit interfaces that are associated with them.

44. What is the name of the layer in the Cisco borderless switched network design that would have more switches deployed than other layers in the network design of a large organization?

  • data link
  • core
  • network access
  • access
  • network

Access layer switches provide user access to the network. End user devices, such as PCs, access points, printers, and copiers, would require a port on a switch in order to connect to the network. Thus, more switches are needed in the access layer than are needed in the core and distribution layers.

45. What is a function of the distribution layer?

  • high-speed backbone connectivity
  • interconnection of large-scale networks in wiring closets
  • network access to the user
  • fault isolation

The distribution layer interacts between the access layer and the core by aggregating access layer connections in wiring closets, providing intelligent routing and switching, and applying access policies to access the rest of the network. Fault isolation and high-speed backbone connectivity are the primary functions of the core layer. The main function of the access layer is to provide network access to the user.

46. Which network design principle focuses on the capability of on-demand seamless network expansion in a switched network?

  • flexibility
  • modularity
  • resiliency
  • hierarchical

There are several sound network design principles that should be used when building design guidelines for a borderless switched network:
Hierarchical – Defines the role of each device at every tier, simplifies deployment, operation, and management, and reduces fault domains at every tier
Modularity – Allows seamless network expansion and integrated service enablement on an on-demand basis
Resiliency – Satisfies user expectations for keeping the network always on
Flexibility – Allows intelligent traffic load sharing by using multiple network resources simultaneously

47. A lab in a network management software company is configuring a testing environment to verify the performance of new software with different network connectivity speeds, including FastEthernet, GigabitEthernet, and 10 GigabitEthernet, and with copper and fiber optic connections. Which type of switch should the software company purchase to perform the tests?

  • fixed configuration
  • access layer
  • modular configuration
  • stackable

A modular configuration switch is used at the distribution and core layers. A modular configuration switch usually takes 3 rack units or more. Modular configuration switches offer more flexibility in the types and number of ports as well as the expansion cards that can be used. A fixed configuration switch tends to be an access layer switch. Stackable switches are usually access layer switches that have been cabled together.

48. What two license conditions would be expected on a new Cisco router once the license has been activated? (Choose two.)

  • License Type: Permanent
  • License Type: ipbasek9
  • License Type: Temporary
  • License State: On
  • License State: Active, In Use
  • License State: Active, Registered

When the show license command is issued, the following information is a sample of what would be found once the license has been activated:
Index 1 Feature: ipbasek9
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
It is important for a technician to be able to verify an activated IOS 15 license.

49. In an IPv6 routing table, all routing table entries are classified as which type of routes?

  • level 2 child routes
  • level 1 parent routes
  • level 1 ultimate routes
  • level 1 network routes

IPv6 is classless by design, making all routes level 1 ultimate routes by default.

50. Which type of traffic requires a separate VLAN, strict QoS requirements, and a one-way overall delay of less than 150 ms across the network?

  • video
  • POP/IMAP
  • HTTP
  • VoIP

VoIP traffic tends to have a separate VLAN to ensure that voice quality is maintained. VoIP traffic requires the following:
• Assured bandwidth to ensure voice quality
• Transmission priority over other types of network traffic
• Ability to be routed around congested areas on the network
• Delay of less than 150 ms across the network

51. What information is added to the switch table from incoming frames?

  • destination MAC address and incoming port number
  • destination IP address and incoming port number
  • source MAC address and incoming port number
  • source IP address and incoming port number

A switch “learns” or builds the MAC address table based on the source MAC address as a frame comes into the switch. A switch forwards the frame onward based on the destination MAC address.

52. Which statement correctly describes how a LAN switch forwards frames that it receives?

  • Cut-through frame forwarding ensures that invalid frames are always dropped.
  • Only frames with a broadcast destination address are forwarded out all active switch ports.
  • Frame forwarding decisions are based on MAC address and port mappings in the CAM table.
  • Unicast frames are always forwarded regardless of the destination MAC address.

Cut-through frame forwarding reads up to only the first 22 bytes of a frame, which excludes the frame check sequence and thus invalid frames may be forwarded. In addition to broadcast frames, frames with a destination MAC address that is not in the CAM are also flooded out all active ports. Unicast frames are not always forwarded. Received frames with a destination MAC address that is associated with the switch port on which it is received are not forwarded because the destination exists on the network segment connected to that port..

Older Version

53. How will a router handle static routing differently if Cisco Express Forwarding is disabled?

  • It will not perform recursive lookups.
  • Serial point-to-point interfaces will require fully specified static routes to avoid routing inconsistencies.
  • Ethernet multiaccess interfaces will require fully specified static routes to avoid routing inconsistencies.
  • Static routes that use an exit interface will be unnecessary.

Explanation: In most platforms running IOS 12.0 or later, Cisco Express Forwarding is enabled by default. Cisco Express Forwarding eliminates the need for the recursive lookup. If Cisco Express Forwarding is disabled, multiaccess network interfaces require fully specified static routes in order to avoid inconsistencies in their routing tables. Point-to-point interfaces do not have this problem, because multiple end points are not present. With or without Cisco Express Forwarding enabled, using an exit interface when configuring a static route is a viable option.

54. Refer to the exhibit. R1 was configured with the static route command ip route 209.165.200.224 255.255.255.224 S0/0/0 and consequently users on network 172.16.0.0/16 are unable to reach resources on the Internet. How should this static route be changed to allow user traffic from the LAN to reach the Internet?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 15

  • Add the next-hop neighbor address of 209.165.200.226.
  • Change the exit interface to S0/0/1.
  • Change the destination network and mask to 0.0.0.0 0.0.0.0.
  • Add an administrative distance of 254

55. In a routing table which route can never be an ultimate route?

  • parent route
  • child route
  • level one route
  • level two route

56. Refer to the exhibit. In the routing table entry, what is the administrative distance?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 16

  • 24
  • 120
  • 2
  • 12

57. How many classful networks are summarized by the static summary route ip route 192.168.32.0 255.255.248.0 S0/0/0?

  • 2
  • 4
  • 8
  • 16

Explanation: A summary route of 192.168.32.0 with a network prefix of /21 will summarize 8 routes. The network prefix has moved from the classful boundary of 24 to the left by 3 bits. These 3 bits identify that 8 networks are summarized. The networks that are summarized would be 192.168.32.0/24 through 192.168.39.0/24.

58. Refer to the exhibit. An administrator is trying to configure PAT on R1, but PC-A is unable to access the Internet. The administrator tries to ping a server on the Internet from PC-A and collects the debugs that are shown in the exhibit. Based on this output, what is most likely the cause of the problem?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 17

  • The address on Fa0/0 should be 64.100.0.1.
  • The NAT source access list matches the wrong address range.
  • The inside global address is not on the same subnet as the ISP.
  • The inside and outside NAT interfaces have been configured backwards.

59. Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 18

  • The NAT pool has been exhausted.
  • The wrong netmask was used on the NAT pool.
  • Access-list 1 has not been configured properly.
  • The inside and outside interfaces have been configured backwards.

60. What is a disadvantage when both sides of a communication use PAT?

  • Host IPv4 addressing is complicated.
  • End-to-end IPv4 traceability is lost.
  • The flexibility of connections to the Internet is reduced.
  • The security of the communication is negatively impacted.

With the use of NAT, especially PAT, end-to-end traceability is lost. This is because the host IP address in the packets during a communication is translated when it leaves and enters the network. With the use of NAT/PAT, both the flexibility of connections to the Internet and security are actually enhanced. Host IPv4 addressing is provided by DHCP and not related to NAT/PAT.

61. A small company has a web server in the office that is accessible from the Internet. The IP address 192.168.10.15 is assigned to the web server. The network administrator is configuring the router so that external clients can access the web server over the Internet. Which item is required in the NAT configuration?

  • an IPv4 address pool
  • an ACL to identify the local IPv4 address of the web server
  • the keyword overload for the ip nat inside source command
  • the ip nat inside source command to link the inside local and inside global addresses

62. A college student is studying for the Cisco CCENT certification and is visualizing extended access lists. Which three keywords could immediately follow the keywords permit or deny as part of an extended access list? (Choose three.)

  • www
  • tcp
  • udp
  • icmp
  • telnet
  • ftp

Explanation: Four commonly used keywords that could follow the keywords permit or deny in an IPv4 extended access list are ip, tcp, udp, and icmp. If the keyword ip is used, then the entire TCP/IP suite is affected (all TCP/IP protocols).

63. What is meant by the term “best match” when applied to the routing table lookup process?

  • network match
  • supernet match
  • exact match
  • longest match

64. Which three advantages are provided by static routing? (Choose three.)

  • Static routing does not advertise over the network, thus providing better security.
  • Configuration of static routes is error-free.
  • Static routes scale well as the network grows.
  • Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does.
  • The path a static route uses to send data is known.
  • No intervention is required to maintain changing route information.

Explanation: Static routes are prone to errors from incorrect configuration by the administrator. They do not scale well, because the routes must be manually reconfigured to accommodate a growing network. Intervention is required each time a route change is necessary. They do provide better security, use less bandwidth, and provide a known path to the destination.

65. A network administrator is implementing a distance vector routing protocol between neighbors on the network. In the context of distance vector protocols, what is a neighbor?

  • routers that are reachable over a TCP session
  • routers that share a link and use the same routing protocol
  • routers that reside in the same area
  • routers that exchange LSAs

66. Refer to the exhibit. The student on the H1 computer continues to launch an extended ping with expanded packets at the student on the H2 computer. The school network administrator wants to stop this behavior, but still allow both students access to web-based computer assignments. What would be the best plan for the network administrator?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 19

  • Apply an outbound extended ACL on R1 S0/0/1.
  • Apply an outbound standard ACL on R2 S0/0/1.
  • Apply an inbound standard ACL on R1 Gi0/0.
  • Apply an inbound extended ACL on R2 Gi0/1.
  • Apply an inbound extended ACL on R1 Gi0/0.

67. What is associated with link-state routing protocols?

  • low processor overhead
  • poison reverse
  • routing loops
  • split horizon
  • shortest-path first calculations

68. How is the router ID for an OSPFv3 router determined?

  • the highest IPv6 address on an active interface
  • the lowest MAC address on an active interface
  • the highest IPv4 address on an active interface
  • the highest EUI-64 ID on an active interface

69. An administrator attempts to change the router ID on a router that is running OSPFv3 by changing the IPv4 address on the router loopback interface. Once the IPv4 address is changed, the administrator notes that the router ID did not change. What two actions can the administrator take so that the router will use the new IPv4 address as the router ID? (Choose two.)

  • Shut down and re-enable the loopback interface.
  • Reboot the router.
  • Copy the running configuration to NVRAM.
  • Clear the IPv6 OSPF process.
  • Disable and re-enable IPv4 routing.

Explanation: There are two methods that can be used to change the router ID of an OSPF router. The router can be rebooted or the OSPF process can be cleared.

70. Refer to the exhibit. Which would be chosen as the router ID of R2?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 20

  • 2001:DB8:CAFE:2::/64
  • LLA: FE80::2
  • 2001:DB8:CAFE:A001::/64
  • The router ID has to be manually configured.

71. Which two pieces of information are required when creating a standard access control list? (Choose two.)

  • destination address and wildcard mask
  • source address and wildcard mask
  • subnet mask and wildcard mask
  • access list number between 100 and 199
  • access list number between 1 and 99

Explanation: Standard ACLs can be numbered 1 to 99 and 1300 to 1999. Standard IP ACLs filter only on the source IP address.

72. Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.)

  • most
  • host
  • all
  • any
  • some
  • gt

73. What is the effect of the access control list wildcard mask 0.0.0.15? (Choose two.)

  • The first 28 bits of a supplied IP address will be ignored.
  • The last four bits of a supplied IP address will be ignored.
  • The first 32 bits of a supplied IP address will be matched.
  • The first 28 bits of a supplied IP address will be matched.
  • The last five bits of a supplied IP address will be ignored.
  • The last four bits of a supplied IP address will be matched.

Explanation: A wildcard mask uses 0s to indicate that bits must match. 0s in the first three octets represent 24 bits and four more zeros in the last octet, represent a total of 28 bits that must match. The four 1s represented by the decimal value of 15 represents the four bits to ignore.

74. An administrator created and applied an outbound Telnet extended ACL on a router to prevent router-initiated Telnet sessions. What is a consequence of this configuration?

  • The ACL will not work as desired because an outbound ACL cannot block router-initiated traffic.
  • The ACL will work as desired as long as it is applied to the correct interface.
  • The ACL will not work because only standard ACLs can be applied to vty lines.
  • The ACL will work as long as it will be applied to all vty lines.

75. A network administrator is testing IPv6 connectivity to a web server. The network administrator does not want any other host to connect to the web server except for the one test computer. Which type of IPv6 ACL could be used for this situation?

  • only a standard ACL
  • a standard or extended ACL
  • only an extended ACL
  • an extended, named, or numbered ACL
  • only a named ACL

76. What does an OSPF area contain?

  • routers that share the same router ID
  • routers whose SPF trees are identical
  • routers that have the same link-state information in their LSDBs
  • routers that share the same process ID

Explanation: An OSPF area contains one set of link-state information, although each router within the area will process that information individually to form its own SPF tree. OSPF process IDs are locally significant and are created by the administrator. Router IDs uniquely identify each router.


77. What is the effect of entering the network 192.168.10.1 0.0.0.0 area 0 command in router configuration mode?

  • The interface with the IPv4 address 192.168.10.1 will be a passive interface.
  • OSPF advertisements will include the network on the interface with the IPv4 address 192.168.10.1.
  • This command will have no effect because it uses a quad zero wildcard mask.
  • OSPF advertisements will include the specific IPv4 address 192.168.10.1.

78. What is the order of packet types used by an OSPF router to establish convergence?

  • Hello, LSAck, LSU, LSR, DBD
  • LSAck, Hello, DBD, LSU, LSR
  • Hello, DBD, LSR, LSU, LSAck
  • LSU, LSAck, Hello, DBD, LSR

79. What best describes the operation of distance vector routing protocols?

  • They use hop count as their only metric.
  • They only send out updates when a new network is added.
  • They send their routing tables to directly connected neighbors.
  • They flood the entire network with routing updates.

80. What is an advantage of using dynamic routing protocols instead of static routing?

  • easier to implement
  • more secure in controlling routing updates
  • fewer router resource overhead requirements
  • ability to actively search for new routes if the current path becomes unavailable

Explanation: Dynamic routing has the ability to search and find a new best path if the current path is no longer available. The other options are actually the advantages of static routing.

81. Refer to the exhibit. R1 and R2 are OSPFv3 neighbors. Which address would R1 use as the next hop for packets that are destined for the Internet?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 21

  • FF02::5
  • 2001:DB8:ACAD:1::2
  • 2001:DB8:C5C0:1::2
  • FE80::21E:BEFF:FEF4:5538

82. Refer to the exhibit. What address will be used as the router ID for the OSPFv3 process?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 22

  • 1.1.1.1
  • 10.1.1.1
  • 192.168.1.1
  • 2001:DB8:CAFE:1::1
  • 2001:DB8:ACAD:1::1

83. Which network design may be recommended for a small campus site that consists of a single building with a few users?

  • a network design where the access and core layers are collapsed into a single layer
  • a collapsed core network design
  • a three-tier campus network design where the access, distribution, and core are all separate layers, each one with very specific functions
  • a network design where the access and distribution layers are collapsed into a single layer

84. When does a switch use frame filtering?

  • The destination MAC address is for a host on a different network segment from the source of the traffic.
  • The destination MAC address is for a host on the same network segment as the source of the traffic.
  • The destination MAC address is for a host with no entry in the MAC address table.
  • The destination MAC address is for a host on a network supported by a different router.

85. Which command will verify the status of both the physical and the virtual interfaces on a switch?

  • show running-config
  • show ip interface brief
  • show startup-config
  • show vlan

86. Refer to the exhibit. A network administrator is investigating a lag in network performance and issues the show interfaces fastethernet 0/0 command. Based on the output that is displayed, what two items should the administrator check next? (Choose two.)
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 23

  • cable lengths
  • damaged cable termination
  • duplex settings
  • electrical interference
  • incorrect cable types

87. Which command would be best to use on an unused switch port if a company adheres to the best practices as recommended by Cisco?

  • shutdown
  • ip dhcp snooping
  • switchport port-security mac-address sticky
  • switchport port-security violation shutdown
  • switchport port-security mac-address sticky mac-address

Explanation: Unlike router Ethernet ports, switch ports are enabled by default. Cisco recommends disabling any port that is not used. The ip dhcp snooping command globally enables DHCP snooping on a switch. Further configuration allows defining ports that can respond to DHCP requests. The switchport port-security command is used to protect the network from unidentified or unauthorized attachment of network devices.

88. Which two commands should be implemented to return a Cisco 3560 trunk port to its default configuration? (Choose two.)

  • S1(config-if)# no switchport trunk allowed vlan
  • S1(config-if)# no switchport trunk native vlan
  • S1(config-if)# switchport mode dynamic desirable
  • S1(config-if)# switchport mode access
  • S1(config-if)# switchport access vlan 1

89. Which two methods can be used to provide secure management access to a Cisco switch? (Choose two.)

  • Configure all switch ports to a new VLAN that is not VLAN 1.
  • Configure specific ports for management traffic on a specific VLAN.
  • Configure SSH for remote management.
  • Configure all unused ports to a “black hole.”
  • Configure the native VLAN to match the default VLAN.

90. Refer to the exhibit. A network administrator is configuring inter-VLAN routing on a network. For now, only one VLAN is being used, but more will be added soon. What is the missing parameter that is shown as the highlighted question mark in the graphic?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 24

  • It identifies the subinterface.
  • It identifies the VLAN number.
  • It identifies the native VLAN number.
  • It identifies the type of encapsulation that is used.
  • It identifies the number of hosts that are allowed on the interface.

91. Refer to the exhibit. A Layer 3 switch routes for three VLANs and connects to a router for Internet connectivity. Which two configurations would be applied to the switch? (Choose two.)
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 25

  • (config)# interface gigabitethernet 1/1
    (config-if)# no switchport
    (config-if)# ip address 192.168.1.2 255.255.255.252
  • (config)# interface vlan 1
    (config-if)# ip address 192.168.1.2 255.255.255.0
    (config-if)# no shutdown
  • (config)# interface gigabitethernet1/1
    (config-if)# switchport mode trunk
  • (config)# interface fastethernet0/4
    (config-if)# switchport mode trunk
  • (config)# ip routing

92. Fill in the blank.
Using router-on-a-stick inter-VLAN routing, how many subinterfaces have to be configured to support 10 VLANs? 10

93. Refer to the exhibit. Inter-VLAN communication between VLAN 10, VLAN 20, and VLAN 30 is not successful. What is the problem?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 26

  • The access interfaces do not have IP addresses and each should be configured with an IP address.
  • The switch interface FastEthernet0/1 is configured as an access interface and should be configured as a trunk interface.
  • The switch interface FastEthernet0/1 is configured to not negotiate and should be configured to negotiate.
  • The switch interfaces FastEthernet0/2, FastEthernet0/3, and FastEthernet0/4 are configured to not negotiate and should be configured to negotiate.

94. When routing a large number of VLANs, what are two disadvantages of using the router-on-a-stick inter-VLAN routing method rather than the multilayer switch inter-VLAN routing method? (Choose two.)

  • Multiple SVIs are needed.
  • A dedicated router is required.
  • Router-on-a-stick requires subinterfaces to be configured on the same subnets.
  • Router-on-a-stick requires multiple physical interfaces on a router.
  • Multiple subinterfaces may impact the traffic flow speed.

95. Which two statements are characteristics of routed ports on a multilayer switch? (Choose two.)

  • They are not associated with a particular VLAN.
  • The interface vlan <vlan number> command has to be entered to create a VLAN on routed ports.
  • They support subinterfaces, like interfaces on the Cisco IOS routers.
  • They are used for point-to-multipoint links.
  • In a switched network, they are mostly configured between switches at the core and distribution layers.

96. Match the borderless switched network guideline description to the principle. (Not all options are used.)
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 27CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 28

97. Fill in the blank. Do not use abbreviations.
The duplex full command configures a switch port to operate in the full-duplex mode.

98. Launch PT. Hide and Save PT

Open the PT activity. Perform the tasks in the activity instructions and then answer the question.
To verify that the SVI is configured correctly, answer this question: Which ping command completed successfully?​
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 29

  • ping 192.168.25.9
  • ping 192.168.25.10
  • ping 192.168.25.7
  • ping 192.168.25.8

CONFIGURATION
SW0(config)#interface vlan 10
SW0(config-if)#ip address 192.168.63.2 255.255.255.0
SW0(config-if)#exit
SW0(config)#ip default-gateway 192.168.63.1
SW0(config)#end

99. Which command will create a static default route on R1 to send all traffic to the Internet and use serial 0/0 as the exit interface?

  • R1(config)# ip route 255.255.255.255 0.0.0.0 serial 0/0
  • R1(config)# ip route 0.0.0.0 255.255.255.0 serial 0/0
  • R1(config)# ip route 0.0.0.0 255.255.255.255 serial 0/0
  • R1(config)# ip route 0.0.0.0 0.0.0.0 serial 0/0

100. What is a result of connecting two or more switches together?

  • The number of collision domains is reduced.
  • The size of the broadcast domain is increased.
  • The number of broadcast domains is increased.
  • The size of the collision domain is increased.

101. What is meant by the term “best match” when applied to the routing table lookup process?

  • exact match
  • longest match
  • network match
  • supernet match

102. A router with two LAN interfaces, two WAN interfaces, and one configured loopback interface is operating with OSPF as its routing protocol. What does the router OSPF process use to assign the router ID?

  • the highest IP address that is configured on the WAN interfaces
  • the IP address of the interface that is configured with priority 0
  • the highest IP address on the LAN interfaces
  • the OSPF area ID that is configured on the interface with the highest IP address
  • the loopback interface IP address

103. Order the DHCP process steps. (Not all options are used.)
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 30
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 31
Place the options in the following order:
Step 3
– target left blank –
Step 4 *
Step 2 *
Step 1*

104. Refer to the exhibit. Host A has sent a packet to host B. What will be the source MAC and IP addresses on the packet when it arrives at host B?
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 32

  • Source MAC: 00E0.FE10.17A3
    Source IP: 10.1.1.10
  • Source MAC: 00E0.FE91.7799
    Source IP: 10.1.1.1
  • Source MAC: 00E0.FE91.7799
    Source IP: 192.168.1.1
  • Source MAC: 00E0.FE91.7799
    Source IP: 10.1.1.10
  • Source MAC: 00E0.FE10.17A3
    Source IP: 192.168.1.1

105. An administrator is trying to remove configurations from a switch. After using the command erase startup-config and reloading the switch, the administrator finds that VLANs 10 and 100 still exist on the switch. Why were these VLANs not removed?

  • These VLANs cannot be deleted unless the switch is in VTP client mode.
  • These VLANs are default VLANs that cannot be removed.
  • These VLANs can only be removed from the switch by using the no vlan 10 and no vlan 100 commands.
  • Because these VLANs are stored in a file that is called vlan.dat that is located in flash memory, this file must be manually deleted.

106. In which type of attack does a malicious node request all available IP addresses in the address pool of a DHCP server in order to prevent legitimate hosts from obtaining network access?​

  • CAM table overflow
  • DHCP snooping
  • MAC address flooding
  • DHCP starvation

107. Refer to the exhibit.
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 33
A Layer 3 switch routes for three VLANs and connects to a router for Internet connectivity. Which two configurations would be applied to the switch? (Choose two.)

  • (config)# interface gigabitethernet1/1
    (config-if)# switchport mode trunk
    (config)# interface fastethernet0/4
    (config-if)# switchport mode trunk
  • (config)# interface gigabitethernet 1/1
    (config-if)# no switchport
    (config-if)# ip address 192.168.1.2 255.255.255.252
  • (config)# interface vlan 1
    (config-if)# ip address 192.168.1.2 255.255.255.0
    (config-if)# no shutdown
  • (config)# ip routing

108. Which characteristic is unique to EIGRP?

  • EIGRP supports classless routing.
  • EIGRP supports loop-free autosummarization.
  • EIGRP supports both IPv4 and IPv6.
  • EIGRP supports unequal-cost load balancing.

109. Match the router memory type that provides the primary storage for the router feature. (Not all options are used.)
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 34
CCNA 2 (v5.0.3 + v6.0) Practice Final Exam Answers 2020 - 100% Full 35
Place the options in the following order.
— not scored —
full operating system -> flash
limited operating system -> ROM
routing table -> RAM
startup configuration file -> NVRAM

Download PDF File below:*

1 Comment
Inline Feedbacks
View all comments
dimitris
dimitris
7 years ago

-> Question 47 is incomplete.
It says “Choose two”.
The correct answers are:

* (config)# ip routing

* (config)# interface gigabitethernet 1/1
(config-if)# no switchport
(config-if)# ip address 192.168.1.2 255.255.255.252

-> Question 31 is wrong.
The correct answer is:

* The router ID has to be manually configured.