Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
CCNA Practice Test 4
Home
CCNA Practice Test 4
Start your CCNA Practice Test 4
You have decided to use modified EUI-64 addresses for a set of devices on your network where the prefix is /64. What steps describe the process of generating a modified EUI-64 address for the host portion of an IPv6 address?
A. 1. Take the MAC address and split it in half 2. Add FFFE between the two half's of the MAC address 3. Flip the 7th bit if it is not already set to on
B. 1. Take the MAC address and divide it by two and discard the uppermost digits 2. Add FFFE between the two half's of the MAC address extending with E's until 128 bits are filled 3. Flip the first 7 bits if they are not already set to on
C. 1. Add FFFE to the end of the MAC address 2. Split the new value in half and add FEFE between the two halves 3. Flip the 7th bit if it is not already set to on
D. 1. Take the MAC address and split it in half 2. Add FFFE between the two half's of the MAC address extending with E's until 128 bits are filled 3. Flip the first 7 bits if they are not already set to on
None
Your business wants to create an app to control their network resources. You need to write up a description of how the app would communicate with the controller and thus to the network devices. What API would the application use to communicate with the controller?
A. North-Bound API
B. South-Bound API
C. Controller API
D. SDN API
E. Native Connect API
None
You have been given a task of preparing the initial configuration on a set of wired and wireless devices for use within a new branch location. Some of the devices are local and others are located across the network. In which ways will you access the devices for their configuration and management?
A. Using CAPWAP on a wireless lan controller (WLC) for access points
B. Using a cable or the antenna for wireless access points
C. Through the command line interface (CLI) using SSH and the devices IP address
D. Through the command line interface (CLI) using a console port for remote devices
E. Correct Answer: Through the command line interface (CLI) using CAPWAP for wired devices
A small business is using IPv4 and Cisco devices and has asked you to give their junior network administrator some information on how to use OSPF. The first question they have is what is required to get two devices that are running OSPF to become neighbors. Therefore, what do two OSPFv2 configured network devices have to share to become neighbors?
A. They must have the same multicast and reference bandwidth
B. They must have the same subnet and Area ID
C. They must have the same Area ID and keep alive
D. They must have the same virtual IP and bandwidth
None
You have been in discussions with a software developer about creating an application to control some aspects of the network. The developer wants to know what APIs they will have to use, and, in particular which communication interfaces those APIs will use to connect and transmit data to the web services. One of the web services is a bit older and uses HTTP and XML. It also does not seem to support or have the ability to use JSON. The other is a newer API and is marketed as a replacement for SNMP. What API interfaces are most likely being used by these two web services?
A. RESTCONF is being used by the older web service as it supports XML and NETCONF is being used by the other since it uses HTTP and SSH to support configuration of devices via networks
B. NETCONF is being used by the older web service as it is the network XML and HTTP web service REST interface and SOAP is being used for the other as SOAP is the new interface for replacing SNMP
C. SOAP is being used by the older web service as it is generally built using HTTP and XML while NETCONF is probably being used for the other as it was designed to replace SNMP
D. REST is being used by the older web service as it uses HTTP and has an API framework while RESTCOST is probably being used by the other since it supports XML and can replace SNMP
None
You are using a syslog server to track the log messages from dozens of cisco devices and servers. However, the log messages are coming in with different time stamps making it difficult to track and debug problems on the network. Currently a junior administrator is manually updating the time on each device almost daily to keep up. What service could be used to automate, manage, and synchronize the time on all the Cisco devices and could also provide the time to the other servers or devices on the network?
A. DHCP
B. SNMP
C. DNS
D. NTP
None
Consider a scenario where you are setting up access point operations through the wireless lan controller. You want to configure one of the access points to operate as an intrusion detection device and another to simply capture and forward traffic and not specifically handle wireless data traffic. Which access point modes will you configure the two access points to be in when in the wireless lan controller?
A. Sniffer access point mode
B. Monitor access point mode
C. Bridge access point mode
D. Local access point mode
A small business wants to add some additional security to their network by allowing only certain traffic to communicate across their network. They have contracted you to help do this but they are not familiar with their Cisco networking equipment and therefore they want to know what options they have available. What are the access control lists options available on Cisco devices to control the network traffic on a device?
A. Network ACLs
B. Named ACLs
C. Permit ACLs
D. Deny ACLs
E. Extended ACLs
F. Standard ACLs
A junior network engineer is configuring the security on a new Cisco device that has recently arrived. The business is fairly small and after they added their three admin users to the system they noticed they have added them all with plain text passwords. They have set the privilege level to 15 so the users will have full access but the configuration using plain text passwords was done incorrectly and the junior network engineer has come to you to find out what went wrong. What should have the junior network engineer done differently when adding the users?
A. The encrypted password option should have been turned on in configuration mode via the encrypt command first
B. The password option passed into the username command should have been replaced with the option secret
C. The encryption key for the device should have been configured before adding the users to the device
D. The password salt option should have been added to the username command to allow the password to be encrypted
None
An associate is asking you about how OSPFv2 differs from EIGRP as the business is planning on switching to OSPF. As part of the conversation you get into how OSPF uses multiple tables on the router in order to better facilitate handling dynamic routing. What are the three tables used in OSPFv2?
A. Routing table
B. Neighbor table
C. LSDB table
D. Topology table
E. Dijkstra table
Time's up