1. The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring? adware DDoS phishing social engineering spyware 2. What causes a buffer overflow? launching a security countermeasure to mitigate a Trojan horse downloading and ...
Category: CCNA v7
CCNA 3 v7 Modules 1 – 2: OSPF Concepts and Configuration Exam Answers
1. What is a function of OSPF hello packets? to send specifically requested link-state records to discover neighbors and build adjacencies between them to ensure database synchronization between routers to request specific link-state records from neighbor routers 2. Which OPSF packet contains the different types of link-state advertisements? hello DBD LSR LSU LSAck 3. Which ...
CCNA 3 v7 Modules 9 – 12: Optimize, Monitor, and Troubleshoot Networks Exam Answers
1. What is the term used to indicate a variation of delay? latency serialization delay speed mismatch jitter 2. A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value? ...
CCNA 3 v7 Modules 6 – 8: WAN Concepts Exam Answers
1. Which two statements accurately describe an advantage or a disadvantage when deploying NAT for IPv4 in a network? (Choose two.) NAT improves packet handling. NAT adds authentication capability to IPv4. NAT will impact negatively on switch performance. NAT causes routing tables to include more information. NAT provides a solution to slow down the IPv4 ...
CCNA 3 v7.0 Final Exam Answers Full – Enterprise Networking, Security, and Automation
1. Which design feature will limit the size of a failure domain in an enterprise network? the purchase of enterprise equipment that is designed for large traffic volume the installation of redundant power supplies the use of a collapsed core design the use of the building switch block approach 2. Which two things should a ...
CCNA 3 v7 Modules 13 – 14: Emerging Network Technologies Exam Answers
1. A company uses a cloud-based payroll system. Which cloud computing technology is this company using? browser as a service (BaaS) infrastructure as a service (IaaS) software as a service (SaaS) wireless as a service (WaaS) 2. For a data center, what is the difference in the server virtualization data traffic compared with the traditional ...
CCNA 2 v7 Modules 5 – 6: Redundant Networks Exam Answers
1. What additional information is contained in the 12-bit extended system ID of a BPDU? MAC address VLAN ID IP address port ID 2. During the implementation of Spanning Tree Protocol, all switches are rebooted by the network administrator. What is the first step of the spanning-tree election process? Each switch with a lower root ...
CCNA 2 v7 Modules 1 – 4: Switching Concepts, VLANs, and InterVLAN Routing Exam Answers
1. Which tasks can be accomplished by using the command history feature? (Choose two.) View a list of commands entered in a previous session. Recall up to 15 command lines by default. Set the command history buffer size. Recall previously entered commands. Save command lines in a log file for future reference. 2. What is ...
CCNA 2 v7 Modules 7 – 9: Available and Reliable Networks Exam Answers
1. A DHCP-enabled client PC has just booted. During which two steps will the client PC use broadcast messages when communicating with a DHCP server? (Choose two.) DHCPDISCOVER DHCPACK DHCPOFFER DHCPREQUEST DHCPNAK 2. An administrator issues the commands: Router(config)# interface g0/1 Router(config-if)# ip address dhcp What is the administrator trying to achieve? configuring the router ...
CCNA 2 v7 Modules 10 – 13: L2 Security and WLANs Exam Answers
1. Which Layer 2 attack will result in legitimate users not getting valid IP addresses? ARP spoofing DHCP starvation IP address spoofing MAC address flooding 2. What mitigation plan is best for thwarting a DoS attack that is creating a MAC address table overflow? Disable DTP. Disable STP. Enable port security. Place unused ports in ...