Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
CCNA Practice Test 7
Home
CCNA Practice Test 7
Start your CCNA Practice Test 7
Implementing the Spanning-Tree Protocol (STP) within a topology requires understanding how STP operates to identify root bridges, root ports, and designated ports as well as the function of various port designations. Suppose you are explaining the current STP topology and reviewing STP port states to a new colleague who will be assisting you in setting up a new branch location in the near future. Which STP port state is capable of sending and receiving of data?
A. Learning
B. Forwarding
C. Listening
D. Blocked
None
You are helping a junior network administrator reset some default administrative distances that were changed manually on the network. What is the default administrative distance that should show in the routing table on a Cisco device for a static route, an EIGRP (Internal) route, and an OSPF route?
A. Static routes default to 1 EIGRP (Internal) routes default to 90 OSPF routes default to 110
B. Static routes default to 90 EIGRP (Internal) routes default to 100 OSPF routes default to 110
C. Static routes default to 10 EIGRP (Internal) routes default to 900 OSPF routes default to 110
D. Static routes default to 100 EIGRP (Internal) routes default to 90 OSPF routes default to 1
None
You are analysing some issues with a routing table on a Cisco router. The IP address for one line in the routing table is 2001:AC:E::1/128 [0/0]. What is the prefix and what does it represent for the IPV6 routing table entry?
A. The prefix is 128 and this represents a host similar to a subnet of 255.255.255.255 for an IPv4 address
B. The prefix is 2001 and represents the local network IPv6 address routing and is similar to a class C address on an IPv4 network
C. The prefix is 0 and this represents the administrative distance for the IPv6 address and is similar to the last byte of an IPv4 subnet mask of 255.255.255.0
D. The prefix is ::1 and this represents a multicast host similar to a 224.0.0.1 IPv4 address
None
You are working with a small network with just a couple devices and a few hosts that was configured using static routes for performance and simplicity reasons. You have been asked to add a route from one device directly to a new host system at 172.14.0.2 with netmask 255.255.255.255. What type of route would you need to create?
A. Network Route
B. Next Route
C. Hop Route
D. Host route
None
A business wants to use multiple 2.4Ghz Wi-Fi access points spread throughout their building. What are the non-overlapping channels for this frequency?
A. 1, 36, and 116
B. 36, 40, and 44
C. 1, 6, and 11
D. 2, 7, and 12
None
You have been asked to plan out the network for a small business with three smaller branch offices in other countries. For compliancy reasons all outbound internet traffic from any branch must come through the main office so it can be inspected. Additionally, the Internet connection at the main office must have redundant hardware so that if one device fails, another device will manage the connection until the issue is resolved. Each branch also has their own server for storing their clients’ personal data; however, any office must be able to access that servers data in order to help clients if any of the offices, including the main office, is not open. However, even if the main office goes offline, access to the data on the servers between the branch offices must still be accessible to each of the other branches. What network topology architecture would work best for the businesses requirements?
A. The main office should use a single homed connection with a cloud based secondary connection and use point-to-point connections from each branch office to the main office
B. The main office should use a single homed connection to the internet and a dual honed spoke connection should be used between the offices to allow full access to each other’s servers
C. The main branch should use a dual homed connection with a MPLS connection from each secondary office connecting them to the main office
D. The main office should use a dual homed connection to the internet and a full mesh network should be used between the branch offices to allow full access to each other’s servers
None
As part of the process of upgrading to using Cisco AAA you have been asked to explain to senior management the different parts of AAA. What description describes the parts of AAA?
A. Authorization is having a user prove who they are. Authentication is used to determine if a person has access to, and what they can do, with a resource. Accounting is the logging of access or authorization
B. Accounting is having a user prove who they are. Authorization is used to determine if a person has access to, and what they can do, with a resource. Affirmation is the logging of access or authorization
C. Authentication is having a user prove who they are. Authorization is used to determine if a person has access to, and what they can do, with a resource. Accounting is the logging of access or authorization
D. Authentication is having a user prove who they are. Affirmation is used to determine if a person has access to, and what they can do, with a resource. Authorization is the logging of access or authorization
None
You have been tasked with configuring 8 access points that will be integrated into an enterprise network. To start you want to plan out the configuration of security, channels, and bands and will use a wireless lan controller for management. What will most likely be included in your deployment plan for the access points?
A. The use of 2.4 or 5.0 GHz bands
B. The use of WPA2 (Enterprise) with AES and 802.1x for authentication
C. The use of WEP and SSIDs for security
D. The use of channels 1, 6, and 11
E. The use of 2.3 and 5.2 GHz bands
You have been called in to diagnose a problem for a small business. They only have two routers and there appears to be a problem getting pings to route between them. When you look at the routing table you want to see either EIGRP, RIP, or Static routing protocol codes. Which values represent these entries in the routing table?
A. Routing table entries representing EIGRP use the letter code EX, RIP are represented with an O, and static entries are listed with an L
B. Routing table entries representing EIGRP use the letter code E, RIP are represented with an P, and static entries are listed with an S
C. Routing table entries representing EIGRP use the letter code D, RIP are represented with an R, and static entries are listed with an S
D. Routing table entries representing EIGRP use the letter code R, RIP are represented with an I, and static entries are listed with an T
None
You have been asked to look at an issue with a network device that is disconnecting clients from time to time. You notice it has Port Security activated and the violation option is set to shutdown. They would like to figure out what device may be causing this issue. What violation option would not shut down the port but would keep a counter of the violations so you could investigate the issue without users being fully disconnected?
A. Protect
B. Classify
C. Restrict
D. Delimitate
None
Time's up