Uploaded by kylezilla123

CCNA common questions

advertisement
Ip Connectivity
1. What are configuration characteristics and feature support of OSPFv2 (select 2)
a. Unlimited hop count, classless routing protocol
b. Explanation - OSPF is link-state routing protocol that builds and maintains global
topology. This is accomplished by link-state advertisements(LSA) between OSPF
neighbors. Topology and routing info is communicated with LSAs
2. What OSPF network type is assigned to an Ethernet network interface
.
Point-to-point
a.
OSPF automatically assigns broadcast network type to an Ethernet interface. There are
serial interfaces as well that are assigned point-to-point network type
3. What is the primary purpose of OSPF router ID
.
Identify OSPF router to routing domain
a.
OSPF routers must be assigned a router ID that is an unique identifier to an OSPF
routing domain, because it is how the router is identified in the OSPF database. Duplicate
routing ID’s will prevent FULL adjacency from forming
4. When does a router discard a packet
.
When there is no default route
a.
A router will discard a packet when there is no route at all. This includes dynamic,
OSPF, static, and default. All packets forwarded from a host must have a destination IP address
or they aren’t sent
5. After network convergence has occurred what standard OSPF packets are sent at
regular intervals between routers.
.
Hello packet
a.
OSPF hello packets are sent at fixed intervals based on the hello timer setting. Hello
packets are sent to discover neighbors, establish neighbors, and act as keepalives. A neighbor
is declared unreachable when hello packets are not received for the interval of the dead timer.
6. What attributes determine route and best path selection (select three)
.
Longest match rule, lowest administrative distance, lowest metric
a.
Route with lowest AD is installed in the routing table when routes exist from different
routing protocols to the same destination. Route with lowest metric is installed in the routing
table when multiple routes exist from the same routing protocol to the same destination.Route in
the routing table with the longest match is selected when multiple routes exist to the same
destination.
7. Refer to the network topology drawing. Select the correct IOS command to configure a
floating static route on router-1 to destination 192.168.3.0/24.
.
a.
a.
b.
Ip route 192.168.3.0 255.255.255.0 172.16.2.2 200
Ad of 200 makes something floating static
8. Refer to the network drawing. Select two commands that when configured on router-1,
would provide a static route to network 172.16.12.0/24 connected to router-3.
Ip route 172.16.1.20 255.255.255.0 172.16.1.2, ip route 172.16.12.0 255.255.255.0 s0/1
1st route creates static route,second just forwards all traffic for 172.16.12.0 through s1/1
9.
What additional route is added to the routing table when interface Gi0/0 is enabled with
IP address 172.33.2.1/24.
a.
172.33.2.1/32
b.
Connected routers are not manually configured or dynamic. They are automatically
added to a routing table. The route entry includes a local network interface.The router installs a
corresponding local host route for each connected interface. It is assigned a /32 subnet mask
that indicates a host route.
10.
What is the purpose of OSPF hello packets? (select two)
.
Neighbor adjacency, DR/BDR election
a.
Refer to question 1
11.
What are three possible reasons why routers cannot establish an OSPF adjacency
.
Incorrect wildcard mask, duplicate router ID, hello timer mismatch
a.
Duplicate router ID will cause FULL adjacencies to not form.
12.
The following is an OSPF route entry from a routing table. What is the metric
calculation? 192.168.12.8/30 [110/128] via 192.168.12.5, 00:35:36, Serial 0/0
.
128
a.
You can tell from [110/128]
13.
What IOS command is used to display the collection of OSPF neighbor link-states
.
Show ip ospf database
a.
IOS command show ip ospf database displays the database topology table.
Network Fundamentals
1. What are three characteristics of Spine-Leaf architecture
Alternative to older STP designs, full mesh, designed for east-west traffic
Composed of a 2-Tier layered design with switches connected via full mesh topology.
2. Select two statements that correctly describe frame switching operation
.
Switches read source and destination MAC address, Switch will flood frames out all
ports except where the frame was learned when destination MAC address is not in MAC
address table
a.
The primary purpose of a switch is to make forwarding decisions based on the
destination MAC address. MAC flooding is used when there is an unknown destination MAC
3. What IOS commands will display the operational status of IPv4 configured addresses
.
Show protocols, show ip interface brief, show interfaces
a.
The operational status (up/up) of any Cisco network interface cannot be verified from sh
running-config cmd. The show interfaces trunk command displays the status of a switch port
with trunk mode enabled
a.
b.
4. What are two components of a Virtual Machines (VM)
Operating system,application
?
5. What are two advantages of private RFC 1918 addressing
.
Conserve address space, network security
a.
The primary advantages of private RFC 1918 address (exmp 10.1.1.1) is address and
conservation since 1918 addresses are only internal hosts and network devices. As a result
they are non routable and used by many different organizations
6. What are three advantages of next-generation firewalls over traditional firewalls
.
Real-time monitoring, throughput, malware protection
.
a.
a.
Next-generation firewall (NGFW) optimize security for connecting directly to internetbased and cloud services. The newest firewall provides inbound/outbound stateful packet
inspection to application-layer and higher
Network Access
1. What is the purpose of Spanning Tree protocol (STP)?
a.
Prevent Layer 2 topology loops
b.
The primary reason for deploying stp is to prevent layer 2 topology loops by configuring
some switch ports to forward and some to block traffic
2. Select the correct commands to configure a switch access port with PortFast enabled
and assign VLAN 10
.
Switchport mode access, switchport access vlan 10, spanning-tree portfast
a.
Vlans are auto created when assigned to a switch port interface, unless explicitly
configured.
3. What is the number assigned to the switch management VLAN
.
1
a.
Vlan 1 is default for any Cisco switch port interface. Primary purpose is to forward
management frames between switches. The following are cisco default switch configuration
settings :
i.
Single broadcast domain (VLAN1)
ii.
All switch ports are assigned to VLAN 1 as a default
iii.
VLAN 1 forwards management traffic and cannot be deleted
iv.
Switch port default operational mode is access port
4. What statements correctly describe switch trunking? (select two)
.
Forward multiple VLANs across Layer 2 domain, enable communication between the
same VLANs
a.
The purpose of a switch trunk is to forward multiple VLANs between switches across a
Layer 2 domain and only enable communication between the same VLAN.
IP Services
1. What IOS commands are mandatory to enable SSHv2 on a Cisco network device
Crypto key gen rsa, ip domain-name, ip ssh version 2
2. What occurs after client is assigned DHCP address, before it can connect to a server
.
DNS query
a.
There is a DNS query sent to the DNS server that resolves the IP address of a server.
That occurs after the client sends a request to the DHCP server for addressing. The DNS server
resolves the hostname and returns destination IP address of server that is added to packet
header
3. What are two primary services provided by Dynamic Host configuration Protocol (DHCP)
.
Configure TCP/IP address settings on hosts, renew host addressing automatically
a.
DHCP server supports allocation of dynamic addressing to clients that include hosts and
network devices. DHCP also manages the renewal of IP addresses from an address pool. The
pool is defined on the server along with the lease time period.
4. What are two advantages of Network Address Translation
.
Eases management of internet connectivity, conceals private IP address assignments
from the internet
a.
a.
The primary advantage of NAT is to map multiple privateIP addresses to a single or
multiple public routable IP addresses.
Automation and Programmability
1. What are three advantages of SDN compared with traditional network architecture
a.
Centralized control plane, open standard, software-based control plane
b.
Software Defined Networking (SDN) is an architecture that separates the control plane
from the data plane. The software on all network devices is moved to an SDN controller. This
allows programmanility of all network devices supporting SDN architecture.
i.
SDN decouples control and data plane
ii.
Control plane is software-based and not a hardware module
iii.
SDN controller is a centralized control plane with a policy engine
iv.
Network transport infrastructure is abstracted from software
2. How does cisco DNA center enable automation
.
Controllers, REST APIs
a.
Controller is network management software? REST APIs is what sends configurations
between layers
3. What statements correctly describe SDN architecture
.
SDN controller is a centralized control plane with a policy engine, SDN architecture
decouples the control and data plane
4. What is the corresponding CRUD operation for an HTTP GET verb
.
READ
5. Select three network overlays
.
VXLAN, VPN, CAPWAP
a.
An overlay is comprised of multiple virtual interconnects between endpoints. In this
context an endpoint can be either a host or network device.
6. What are four advantages of an SDN controller
.
Network appears as a single switch, moves control plane from physical devices to
software abstracted layer, network services are dynamically configurable, centralized
management and network intelligence
a.
See previous explanations
7. What are two advantages of automation
.
centralized , test and deploy
a.
Centralized because coming from one place, most offer a cmd emulator that will show
results of a configuration pushout
Security Fundamentals
1. What are the components of a standard ACL?
Source address, wildcard mask
Most basic ACL as follows
i.
Access-list 99 deny host 172.33.1.1
ii.
Access-list 99 permit any
2. What port number or keyword is assignable to permit or deny DNS within an extended
ACL
.
Domain
a.
In ACLs DNS is assigned the keyword domain or application port 53 because it uses udp
and tcp 53
3. What wireless authentication protocol provides the most security
.
WPA2
a.
WPA2-PSK stands for WPA2 pre shared keys and is less secure and intended for a
SOHO environment
4.
a.
b.
Download