Free Tech Exams
HOME
COMPTIA
A+ Practice Tests
Network+ Practice Tests
Security+ Practice Tests
CISCO
CCT Practice Tests
CCNA Practice Tests
CCNP Practice Tests
MICROSOFT
MTA Practice Tests
✕
CCNA Practice Test 8
Home
CCNA Practice Test 8
Start your CCNA Practice Test 8
A small business owner has had a network attack that caused some damage to their business processes but did not compromise data. The owner wants to get revenge on the attacker and you have been asked to help. You explain that a reactive approach to the attack would probably not be beneficial and could actually cause more harm and you instead suggest the business take a proactive security posture to prevent a hacker from causing harm again in the future. What are three basic security program components from Cisco that are proactive for security?
A. Password management
B. Physical Access Controls
C. User Awareness
D. Training
E. Mitigation Techniques
Your company recently expanded their network with a small branch office location and you are responsible for setting up the newly purchased switches for VLANs and supporting VLAN traffic. Your task is to configure VLANs and trunks. You have created VLAN 20 and are required to specify that the port will function at Layer 2, and places the port in VLAN access mode. What command and which configuration mode would complete this task?
A. The switch port access command in global configuration mode
B. The access port command in interface configuration mode
C. The switch access port command in global configuration mode
D. The switchport mode access command in interface configuration mode
None
You have bene asked to configure a VPN from your business to a business across the country. Your business has recently partnered with this other business for a large government contract and they have multiple servers and resources that must be accessible with each other. The VPN connection must always be up and must allow both networks to communicate securely with each other and access resources from either end. What VPN technology should be used to connect these networks?
A. Site-to-Site VPN
B. Network Access VPN
C. ASA-ASA Tunnel VPN
D. Remote Access VPN
None
Within your OSPFv2 network you have multiple point-to-point and multiaccess networks managed by Cisco devices. The OSPFv2 election has made some devices Designated Routers (DR) and has set others up as Backup Designed Routers (BDR). What would the other devices in the multiaccess network be set to if they are not a DR or BDR?
A. DRCHILD
B. DRFULL
C. DRBROADCAST
D. DRCLIENT
E. DROTHER
None
You have been tasked with automating your network hardware infrastructure for a medium sized business that is growing. Part of the upgrade will switch to using a SDN architecture in a new private cloud. What terminology represents the infrastructure like the physical switches, routers, cables, etc of a software defined architecture?
A. Control Plane
B. Cloth
C. Underlay
D. Overlay
None
You have been monitoring traffic on some systems and the network and a manager asks you about all the traffic starting with fe80 that they see when they take a look at your screen running wireshark. What type of IPv6 network traffic starts with fe80?
A. AnyCast
B. Unique local unicast
C. Link-local unicast
D. Global unicast
None
You are working with a software developer building an application to automate a small networking task that has been taking a lot of your time doing manually. Unfortunately, the developer is not that familiar with networking or networking protocols but can use components to make everything work. The programmer has come to you since the code is returning a lot of numerical values like 200, 201, 404, 401, 503, etc. What would give the programmer an overview of the different meanings and groupings of the responses?
A. The 300's means the server did something wrong, the 400's means everything worked, and the 200's means the code did something wrong
B. The 100's means everything worked, the 200's means something went wrong on the server, and the 400's means the code did something wrong
C. The 200's means everything worked, the 400's means the code did something wrong, and 500's means something went wrong on the server
D. The 500's means everything worked, the 400's means the server did something wrong, and the 300's means something went wrong on the server
None
A large business has hired you as a consultant to help them decide which wireless infrastructure they want to implement. They currently do not have any wireless but need it to support a variety of business growth plans. They deal with medical and personal data so the data must be protected as well as protecting any access to the physical network. They expect about 200 users and they would like to use their current RADIUS infrastructure used for authentication and in the future will want to implement biometrics. Which Wireless security protocol would you recommend then focus on for their infrastructure?
A. WPA
B. WPA2 (Enterprise)
C. WPA2 (PSK)
D. WEP
E. WPA2
None
Consider a scenario where you are configuring a trunk link between two access layer switches to carry traffic for 12 VLANs. Today you have an intern who is working towards obtaining their CCNA certification with you and they want to understand how the native VLAN operates on switches and asks which attributes are inherent to 802.1Q native VLANs. What responses are you most likely to provide the intern?
A. A native VLAN mismatch causes traffic to be merged between the VLANs
B. The native VLAN should be disabled with the shutdown command
C. Native VLAN frames are tagged when they are carried over the link
D. An unused VLAN should be configured to be the native VLAN on trunk links
E. The default native VLAN is VLAN 101
You have been given control over a very diverse and large network consisting of many Cisco devices that have been cobbled together from multiple smaller businesses over a series of years from acquisitions. Unfortunately, each smaller network had used their own choices for the Dynamic Routing Protocols used on their portion of the network. This means the Routing Protocol metric is calculated differently depending on the network. As part of the process of identifying and documenting the network for future planning and upgrades you need to identify the different ways the Routing Protocol Metric has been used. What are the metric calculation for the RIP, RIPv2, EIGRP, and OSPF calculations?
A. RIP and RIPv2 use Bandwidth, EIGRP uses Bandwidth + Hop Count, and OSPF uses reference BW
B. RIP and RIPv2 use hop count, EIGRP uses Bandwidth + Delay, and OSPF uses Reference BW/Actual BW
C. RIP and RIPv2 use Bandwidth + Delay, EIGRP uses Reference BW, and OSPF uses Reference BW/Hop Count
D. RIP and RIPv2 use Reference BW, EIGRP uses Bandwidth, and OSPF uses Actual BW
None
Time's up