CCNA Volume 2 (Final Examination) Copy
Quiz Summary
0 of 59 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 59 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 59
1. Question
Question 1Which of the following protocols is used to automatically assign Ip addresses to host?CorrectIncorrect -
Question 2 of 59
2. Question
Question 2What is the port number for DNS serverCorrectIncorrect -
Question 3 of 59
3. Question
Question 3
The Service used to resolve URL to an IP address is called?CorrectIncorrect -
Question 4 of 59
4. Question
Question 4
The DHCP process involves all the following EXCEPT?CorrectIncorrect -
Question 5 of 59
5. Question
Question 5
The First step of a DHCP process is called?CorrectIncorrect -
Question 6 of 59
6. Question
Question 6
Which Command on the CLI is used to help with directing the broadcast message from the first router to the correct DHCP ServerCorrectIncorrect -
Question 7 of 59
7. Question
Question 7
Which of the following is NOT a Protocol under FHRP?CorrectIncorrect -
Question 8 of 59
8. Question
Question 8
Which redundancy protocol allows for 4 gateways and load balancing?CorrectIncorrect -
Question 9 of 59
9. Question
Question 9
Which redundancy protocol allows for 2 gateways and no load balancing?CorrectIncorrect -
Question 10 of 59
10. Question
Question 10
NTP is a UDP protocol with a port number of?CorrectIncorrect -
Question 11 of 59
11. Question
Question 11
The source of Time for an NTP is called?CorrectIncorrect -
Question 12 of 59
12. Question
Question 12
What command on the router is used to configure a server mode of NTPCorrectIncorrect -
Question 13 of 59
13. Question
Question 13
The Simple Network Management Protocol (SNMP) uses which software?
CorrectIncorrect -
Question 14 of 59
14. Question
Question 14
The agent side of the SNMP server is comprised of ?CorrectIncorrect -
Question 15 of 59
15. Question
Question 15
SNMP is a User datagram protocol having the port number of?CorrectIncorrect -
Question 16 of 59
16. Question
Question 16
QoS will be preferred based on the following factors except?CorrectIncorrect -
Question 17 of 59
17. Question
Question 17
____________ is counting the traffic before transmitting it and limiting itCorrectIncorrect -
Question 18 of 59
18. Question
Question 18____________ limits the queued traffic to a certain amount of trafficCorrectIncorrect -
Question 19 of 59
19. Question
Question 19
The FTP channel responsible for establishing connection between the host and FTP server is called?CorrectIncorrect -
Question 20 of 59
20. Question
Question 20
The Data channel of FTP has a port number of ?CorrectIncorrect -
Question 21 of 59
21. Question
Question 21
Which service is used to remotely access a switch/router from a different location securely?CorrectIncorrect -
Question 22 of 59
22. Question
Question 22
What are the basic functions of NAT?CorrectIncorrect -
Question 23 of 59
23. Question
Question 23
A PAT in NAT uses one public IPv4 address with the help of which of the followingCorrectIncorrect -
Question 24 of 59
24. Question
Question 24
The TFTP protocol uses the port number of?CorrectIncorrect -
Question 25 of 59
25. Question
Question 25
A technical/Logical mitigation includes which all the following except?CorrectIncorrect -
Question 26 of 59
26. Question
Question 26
Policies, procedures, written documents, periodic security awareness can be classified under which of the following?
CorrectIncorrect -
Question 27 of 59
27. Question
Question 27
Securing device racks can be a function of which type of mitigation?CorrectIncorrect -
Question 28 of 59
28. Question
Question 28Which of the following does not Use Local Credentials and applying them upon the portsCorrectIncorrect -
Question 29 of 59
29. Question
Question 29Which of the following is/are functions of the VPN?CorrectIncorrect -
Question 30 of 59
30. Question
Question 30
Which type of VPN uses an IGP for routing and forwarding? a. Peer-to-peer b. client VPN c. overlayCorrectIncorrect -
Question 31 of 59
31. Question
Question 31
Which type of VPN obtains a circuit from the ISP?CorrectIncorrect -
Question 32 of 59
32. Question
Question 32
Which type of VPN uses a remote connection to access the VPN Tunnel?CorrectIncorrect -
Question 33 of 59
33. Question
Question 33
The following are functions of the Switch port violation exceptCorrectIncorrect -
Question 34 of 59
34. Question
Question 34
Which switch port command enables the engineer to view logs of external sources connected to the ports?
CorrectIncorrect -
Question 35 of 59
35. Question
Question 35
The instance of ACL of 1-99 is used in which type of ACL?CorrectIncorrect -
Question 36 of 59
36. Question
Question 36
The instance of ACL of 100-199 is used in which type of ACL?CorrectIncorrect -
Question 37 of 59
37. Question
Question 37
The wireless standard for a speed of 4Gbps is calledCorrectIncorrect -
Question 38 of 59
38. Question
Question 38
The encoder responsible for converting the data (0, 1) into electro-magnetic waves is called?CorrectIncorrect -
Question 39 of 59
39. Question
Question 39
The measure of the power of frequency is called?CorrectIncorrect -
Question 40 of 59
40. Question
Question 40
The Network device responsible for generating and using data is called?
CorrectIncorrect -
Question 41 of 59
41. Question
Question 41
The central point of management for Wi-Fi devices is called?CorrectIncorrect -
Question 42 of 59
42. Question
Question 42
A single APs and its coverage area is called?CorrectIncorrect -
Question 43 of 59
43. Question
Question 43
A collection of Aps connected to the same DS, offering the same WLAN and SSID (hotspot)CorrectIncorrect -
Question 44 of 59
44. Question
Question 44
The wireless communication between two stations without an AP is called?CorrectIncorrect -
Question 45 of 59
45. Question
Question 45
A group of Radio Frequencies (RF) are being established and are encoding and transmitting data is are collectively called?CorrectIncorrect -
Question 46 of 59
46. Question
Question 46
Access Points that transmits and receives RF frames, detect collision and responsible for data management are called?CorrectIncorrect -
Question 47 of 59
47. Question
Question 47
When having WLC and LAP scenario, there will be a private tunnel between them, it will encapsulate and transfer all the control and data information between the WLC and LAPs is called?CorrectIncorrect -
Question 48 of 59
48. Question
Question 48
The CAPWAP tunnel is made up of which channels?CorrectIncorrect -
Question 49 of 59
49. Question
Question 49
Which WLC positioning architecture provides switches that can have WLC integrated inside the switch itself (embedded)CorrectIncorrect -
Question 50 of 59
50. Question
Question 50
All the following are AP Modes EXCEPT?CorrectIncorrect -
Question 51 of 59
51. Question
Question 51Which AP Mode monitors data to generate reports and statistics and send to the WLCCorrectIncorrect -
Question 52 of 59
52. Question
Question 52Automation provides all the following except?CorrectIncorrect -
Question 53 of 59
53. Question
Question 53
Automation in networking is achieved through?CorrectIncorrect -
Question 54 of 59
54. Question
Question 54
Which of the following is referred to as the Stateful SDNCorrectIncorrect -
Question 55 of 59
55. Question
Question 55
Which of the following is a stateless approach/SDN?CorrectIncorrect -
Question 56 of 59
56. Question
Question 56
The physical devices used to build an underlay network Is called?CorrectIncorrect -
Question 57 of 59
57. Question
Question 57
Which of the planes is responsible for Learning information from the protocols and Downloading them to the Data plane (as Tables)CorrectIncorrect -
Question 58 of 59
58. Question
Question 58
The puppet and chef use the pull model and as such use which of the following implementation approach?CorrectIncorrect -
Question 59 of 59
59. Question
Question 59
Which of the following are built inside the cisco DNA CenterCorrectIncorrect