Ccna ® Certification Practice Tests Jon Buhagiar



Download 10,86 Mb.
Pdf ko'rish
bet35/54
Sana24.09.2021
Hajmi10,86 Mb.
#183233
1   ...   31   32   33   34   35   36   37   38   ...   54
Bog'liq
CCNA Certification Practice Tests Exam 200-301 2020

scpadmin and your password was Sybex?

A. 


Switch(config)#ip scp user scpadmin password Sybex

B. 


Switch(config)#username scpadmin password Sybex

C. 


Switch(config)#username scpadmin privilege-level 15

password Sybex

D. 

Switch(config)#ip scp user scpadmin privilege-level 15



password Sybex

76. In a basic VLAN hopping attack, which switch feature do

attackers take advantage of?

A. An open Telnet connection

B. Automatic encapsulation negotiation

C. Forwarding of broadcasts

D. The default automatic trunking configuration

77. Which security mitigation technique can be used to stop a MAC

address flooding attack?

A. ACLs


B. NAT

C. Port security




D. VLAN access control lists (VACLs)

78. Which of the following is a recommended physical security

method?

A. Locking doors

B. Installing antivirus software

C. Enabling firewalls

D. Applying directory-level permissions

79. You are connected to the console of a switch. As you are

configuring the switch, console logging is disrupting your

commands and making it hard to configure the switch properly.

Which command will allow the console message to still appear

but not disrupt what you are typing?

A. 

Switch#no logging inline



B. 

Switch(config)#logging synchronous

C. 

Switch(config-line)#logging synchronous



D. 

Switch#logging synchronous

80. You have a router that you configured with a password, but you

have forgotten the password. You have a copy of a recent

configuration, and the password line reads as 

password 7

06074352EFF6

. How can you access the router?

A. You must call the Cisco Technical Assistance Center to

reverse the password.

B. You need to enter the password 06074352EFF6.

C. Log into another router and type 

decrypt-password

06074352EFF6

 in privileged exec mode.

D. Perform a password recovery on the router.

81. Which port must be open to the RADIUS or AAA server for

authentication from the authenticator?

A. UDP/49

B. UDP/1821




C. UDP/1812

D. UDP/1813

82. What is a consideration that can restrict GRE tunnel creation?

A. The tunnel interface number

B. ACLs on the firewall

C. Speed of the tunnel

D. Number of hops between the source and destination

83. Which WAN protocol does not support multicast packets?

A. GRE

B. IPsec


C. PPP

D. MPLS


84. Which command will configure an access list that will deny

Telnet access from the 192.168.2.0/24 network and allow all

other traffic?

A. 


Router(config)#access-list 101 deny tcp 192.168.2.0

0.0.0.255 any eq 23

Router(config)#access-list 101 permit ip any any

B. 


Router(config)#access-list 101 deny 192.168.2.0

0.0.0.255 eq 23

Router(config)#access-list 101 permit ip any any

C. 


Router(config)#access-list 101 block tcp 192.168.2.0

0.0.0.255 any eq 23

Router(config)#access-list 101 permit ip any any

D. 


Router(config)#access-list 101 deny 192.168.2.0

0.0.0.255 any eq 23

Router(config)#access-list 101 permit any any

85. You need to make a modification to a rule in a standard

conventional access list. How can you achieve this?

A. Enter the ACL editor and change the entry.




B. Remove the entire ACL and add it back with the

modification.

C. Remove the line number and add the new line number back

with the modification.

D. Remove the entry with the 

no

 command and add it back.



86. Which command is used to view the DHCP snooping database?

A. 


Switch#show dhcp binding

B. 


Switch#show ip dhcp binding

C. 


Switch#show ip dhcp snooping database

D. 


Switch#show ip dhcp snooping binding

87. Refer to the following exhibit. What will happen when a

computer with a different MAC address connects to the

interface?

A. The computer will not be allowed to communicate, but the

port will remain up.

B. The computer will be allowed to communicate.

C. The computer will not be allowed to communicate and the

port will enter an 


err-disabled state.

D. The computer will be allowed to communicate and the

access will be logged.

88. Which authentication method will allow an authenticated user

to access only certain commands on a router or switch?

A. TACACS+

B. AAA


C. RADIUS

D. 802.1X




89. You need to implement a wireless authentication system that

provides encryption and authentication of user accounts. Which

technology would you deploy?

A. WPA2-PSK

B. WPA2-EAP

C. WPA2-LEAP

D. WPA3-PSK

90. When configuring a WLAN with WPA2 PSK using the GUI of a

wireless LAN controller, which parameter policy should be

configured for the highest security?

A. 802.1X

B. WPA2 Policy-AES

C. WPA Policy

D. PSK


91. Which is the most important aspect to understand when

automating changes across an enterprise?

A. How to automate the change

B. The effect of the change

C. The topology of the network

D. The connections between the devices

92. Which is a popular scripting language used to automate changes

that also allows for easy readability of the script?

A. C++

B. Python



C. C#

D. JSON


93. Which tool allows you to manage all of your Cisco device

licensing needs through a single user interface?

A. Cisco SMARTnet



B. Cisco License Manager

C. Cisco Network Assistant

D. Cisco Prime Infrastructure

94. Which is a protocol found on the overlay of an SDN?

A. VXLAN

B. OSPF


C. OpenFlow

D. JSON


95. Which is commonly used with the northbound interface of an

SDN controller?

A. CLOS

B. OpenFlow

C. Python

D. NETCONF

96. You need to configure some default servers for DNS, AAA, and

NTP for device provisioning. Which section in Cisco DNA Center

will allow you to configure these defaults?

A. Design

B. Discovery

C. Provision

D. Platform

97. Which REST-based HTTP verb is used to update or replace data

via the API?

A. POST


B. GET

C. UPDATE

D. PUT



98. You just finished creating a script that will interface with Cisco

DNA Center via the REST-based API. When you run the script,

you receive a 400 status code. What is wrong?

A. Nothing, it is okay.

B. Forbidden request.

C. Bad request.

D. Internal server error.

99. Which programming language is used for creating a Chef recipe

to apply configuration management?

A. Ruby


B. Python

C. PowerShell

D. YAML

100. Which statement best describes how the JSON file format starts

and ends?

A. A JSON file starts with double quotes and ends with double

quotes.

B. A JSON file starts with single quotes and ends with single

quotes.

C. A JSON file starts with square brackets and ends with

square brackets.

D. A JSON file starts with curly brackets and ends with curly

brackets.




Download 10,86 Mb.

Do'stlaringiz bilan baham:
1   ...   31   32   33   34   35   36   37   38   ...   54




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish