Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
CCNA Practice Test 3
Home
CCNA Practice Test 3
Start your CCNA Practice Test 3
You have been tasked with implementing an Ether Channel solution for a new small business network environment. The requirements include supporting a larger bandwidth path that avoids switch loops, operating in a mixed vendor environment, be able to aggregate non Cisco switches back to the headquarters location, be dynamic in nature, and always be unconditionally active. What EtherChannel solution will you deploy?
A. Static EtherChannel is the best solution
B. PAgP is the best solution
C. LACP is the best solution
D. Layer 3 EtherChannel is the best solution
None
Consider a scenario where you have been tasked with configuring 8 access points that will be integrated into an enterprise network. The access points require configuration of 802.1x security, power control, dynamic channel assignment, and radius authentication. What will you use to configure the access points and what protocol will be used for management?
A. The wireless antennas for access point configuration and RADIUS for management
B. An existing lightweight access point for access point configuration and the CAPWAP protocol for management
C. A wireless LAN controller for access point configuration and RADIUS for management
D. A wireless LAN controller for access point configuration and the CAPWAP protocol for management
None
A team has been asked to setup and configure Simple Network Management Protocol on a group of local Cisco devices to help with managing and monitoring thier Cisco devices. However, the team had not used SNMP before and wants to use the minimum amount of resources but still needs to ensure they meet compliancy and business requirements. As the only one who knows about SNMP they have asked you to summarize the different versions. Which description best lays out the differences between the SNMP versions?
A. Version 1 offers simple authorization. Version 2c offers authorization and authentication. Version 3 offers authentication, authorization, and encryption.
B. Version 1 offers no authentication or authorization. Version 2c offers user management and authentication via an unencrypted community string. Version 3 offers authorization and authentication via an encrypted Community string.
C. Version 1 offers a clear way to query devices. Version 2c offers authorization via an encrypted Community string. Version 3 offers user management for authentication.
D. Version 1 offers a simple way to query devices but has no authentication or authorization. Version 2c offers the use of a Community string for authorization but it was in plain text. Version 3 offers authorization, authentication, and encryption.
None
A small business has decided to switch from wired networking to simply using wireless for their 5 employees. You have been hired to guide them with the planning of their Wi-Fi implementation. They would like to give employees the opportunity to get near gigabit speeds although most will not need it except when transferring the odd file from employee to employee. Their employees are also not very technical so they want an easy way to identify the network when employees are using it. They want to protect the data that transfer over the network with encryption. However, with so few employees they don't really have infrastructure beyond having common passwords they share already. They have no interest in purchasing advanced encryption or security hardware or software beyond what would built into a wireless device itself. What recommendation would work best for this small business in terms of their SSID, Encryption, and IEEE standard?
A. The SSID should simply be the personal names for each employee to make identifying it easy. For the IEEE standard it sounds like 802.11ax (Wi-Fi 6) standard would be required using the 5 Ghz frequency. Using WPA with TKIP should give them the encryption necessary to protect their data since it uses the Triple-DES encryption standard.
B. The SSID should be generic or random to protect the network. For the IEEE standard it sounds like 802.11ac (Wi-Fi 5) standard would be sufficient using the 2.4 & 5 Ghz frequencies. Using WPA2 Enterprise should give them the encryption necessary to protect their data since it is the only one that uses AES.
C. The SSID should simply be a random string they share. For the IEEE standard it sounds like 802.11n (Wi-Fi 4) standard would be sufficient using the 2.4 & 5 Ghz frequencies. Using WPA2 Enterprise should easily give them the encryption necessary to protect their data.
D. The SSID should simply be their business name to make identifying it easy. For the IEEE standard it sounds like 802.11ac (Wi-Fi 5) standard would be sufficient using the 2.4 & 5 Ghz frequencies. Using WPA2 PSK should give them the encryption necessary to protect their data.
None
You have been asked to setup a network for a small business with nine systems for personnel that work there. The business has a Cisco router and the ISP has assigned a single static internet routable IP address. What type of network address translation should you configure so that all the personnel could use the internet at the same time?
A. Port address translation
B. Overloaded network address translation
C. Static network address translation
D. Pooling network address translation
None
A junior network engineer has been tasked with tracking down issues that a lot of employees are having with their wireless devices. The devices are disconnecting and not reconnecting or failing to connect to the network or resources when they move from the back offices to the conference rooms in the front of the building. They are trying to figure out where they should start debugging the issue but are stumped and thus have come to you. This is a very large network with many management layers and hardware devices supporting hundreds of wireless devices. Which network components would you suggest they start with to investigate this issue?
A. L2 and L3 Switches
B. WLCs and APs
C. DNA Center and the Routers
D. Endpoint devices and Servers
None
A junior network administrator is doing some traffic analysis on a medium sized network. They are trying to figure out which traffic they can ignore as they try to focus on problem areas. They come to you asking about link-local scope multicast IPv6 addresses since they know multicast is not the problem and want to filter them out. What could you suggest to the network administrator to help them with filtering out Ipv6 multicast packets?
A. IPv6 multicast addresses don't exist in IPv6 and instead they use well known assigned values based on a convention where the first byte starts with F followed by all zeros and then the last byte contains an identifier for the type of traffic and those that match can be filtered out
B. IPv6 multicast addresses start with FF02 and they can filter all those out
C. IPv6 multicast addresses start with FE80 and they can filter all those out
D. IPv6 multicast addresses use special values in the last byte of the IPv6 address so any address ending with 1, 2, 5, or A can be filtered out
None
You have been hired to help a medium sized business switch from IPv4 to IPv6 on their internal network. All the networking devices are Cisco devices and the default gateway is 2001:c0:a8:10::3 How is the route command for IPv6 different from IPv4 for setting the default route?
A. IPv4 requires the use of an IP and subnet of 0.0.0.0 while IPv6 just requires the default gateway IP
B. IPv6 uses ::/0 instead of 0.0.0.0 0.0.0.0 for setting the default gateway in the route command
C. IPv4 uses the ip route command while ipv6 use the ipv6 route command
D. IPv6 uses 2001::0 with no prefix for setting the default gateway in the route command
A junior administrator is writing up a document to describe ways in which the network can be hardened to protect against security threats. They have come to you asking you for a term to describe what risk the use of default passwords and default configuration on devices could represent. What terminology describes the risk from using default configurations or default passwords?
A. Exploits
B. Assets
C. Vulnerabilities
D. Threats
None
You have been brought in to help a small business deal with an intermittent problem they are having with their network. They use the First Hop Redundancy protocol HSRP on two devices where one has the IP 192.168.1.1 and the other is 192.168.1.2. Both devices are configured and work; however, whenever the Cisco device with the 192.168.1.1 address is disconnected everyone’s Internet access stops. You have checked a couple client systems and the IP for the gateway is set to 192.168.1.1. What is the most likely cause for this failure?
A. The virtual IP address on the first device must be set to the IP address of the second device to allow for the transition failover
B. The secondary device has not been configured properly to take over the IP address of 192.168.1.1 when the first device goes offline
C. The clients are set to the wrong IP address and their gateway should be set to the Virtual IP address configured in the HSRP settings
D. The virtual IP configured on both devices must be set to first devices IP so both can take over when one or the other fails
None
Time's up