CCNP Enterprise Mock-up Test – 3 (Free) (27 questions)

Please enter your email:

1. What network architecture layers are combined in a collapsed core design?

 
 
 
 

2. Which type of DNS record is used to map a hostname to an IPv6 address?

 
 
 
 

3. A Unique Local IPv6 Address, which cannot be routed over the public Internet, begins with what hexadecimal prefix?

 
 
 
 

4. Which of the following are configurable versions of Simple Network Management Protocol (SNMP) within Cisco IOS? (Choose 3.)

 
 
 
 
 
 

5. What Cisco technology allows you to interconnect multiple physical switches into a single logical switch?

 
 
 
 

6. In an attempt to recover a lost password on a Cisco router, you issue a Break during the router’s boot sequence. This takes you to the ROM Monitor prompt. From there, you want to set the configuration register such that the router’s startup configuration will be ignored the next time it boots. To which of the following values should you set the configuration register?

 
 
 
 

7. You are working for a company that will be using the 192.168.1.0 /24 private IP address space for IP addressing inside their organization.

They have multiple geographical locations and want to carve up the 192.168.1.0 /24 address space into subnets. Their largest subnet will need 13 hosts.

What subnet mask should you use to accommodate at least 13 hosts per subnet, while maximizing the number of subnets that can be created?

 
 
 
 
 

8. Which of the following is considered to be an unreliable Transport Layer protocol?

 
 
 
 
 

9. You are examining a router’s running configuration and notice that the password for the VTY lines is in clear text:

…OUTPUT OMITTED…

line vty 0 4

exec-timeout 0 0

password cisco

logging synchronous

login

…OUTPUT OMITTED…

You want the VTY line password to be encrypted in the running configuration, as follows:

line vty 0 4

exec-timeout 0 0

password 7 02050D480809

logging synchronous

login

What command should you enter to encrypt the VTY line password?

 

 
 
 
 

10. What is the subnet address of the IP address 192.168.5.55 with a subnet mask of 255.255.255.224?

 
 
 
 
 

11. Consider the following port security configuration:

 

Switch(config)# int gig 1/0/1

Switch(config-if)# switchport mode access

Switch(config-if)# switchport port-security

Switch(config-if)# switchport port-security maximum 3

Switch(config-if)# switchport port-security mac-address sticky

Switch(config-if)# switchport port-security violation restrict

 

What does the restrict option in the bottom command do?

 
 
 
 
 

12. Which of the following protocols allow you to view Layer 2 adjacent network devices from a Cisco router or Cisco Catalyst switch command prompt? (Choose 2.)

 
 
 
 

13. You issue the ping 192.168.1.2 command from a router, and the response displayed on the router is:

M.M.M

What does this response indicate?

 
 
 
 

14. What type of Cisco Catalyst Switch port configuration allows a port to be an access port that supports two VLANs, if and only if one of the two VLANs is designated as a voice VLAN?

 
 
 
 

15. An IP address of 192.168.0.100 /27 belongs to which of the following subnets?

 
 
 
 
 

16. Given a subnet of 172.16.56.0 /21, identify which of the following IP addresses belong to this subnet. (Select 2.

 
 
 
 

17. What type of queuing adds a priority queue to CB-WFQ?

 
 
 
 

18. A Cisco Application Policy Infrastructure Controller – Enterprise Module (APIC-EM) uses Northbound APIs to connect to what?

 
 
 
 

19. Your new employee tells you that they are unable to log into router R1 via Telnet. You examine the router’s configuration and find the following configuration:

. . . OUTPUT OMITTED . . .                                                                                                                                                                                                                                                                                                                                                      line vty 0 4                                                                                                                                                                          exec-timeout 0 0                                                                                                                                                                        logging synchronous                                                                                                                                                                    login                                                                                                                                                                                                                                                                                                                                                                          . . . OUTPUT OMITTED . . .

Why is your new employee unable to log into router R1 via Telnet?

 
 
 
 

20. Which of the following are features of Point-to-Point Protocol (PPP)? [Choose 4.]

 
 
 
 
 

21. How can an IPv6 address of 2200:5678:0001:0000:0000:000A:0000:0001 can be abbreviated?

 
 
 
 
 

22. A customer is using a Class C network of 192.168.10.0 subnetted with a 28-bit subnet mask. How many assignable addresses are available in each of the subnets?

 
 
 
 
 

23. Which of the following features allows a Cisco Catalyst switch to create a copy of frames appearing on a switch port or in a VLAN, and send those copied frames out of a designated port?

 
 
 
 

24. If Spanning Tree Protocol (STP) operation fails in a network with redundant links, what symptoms could result? (Choose 3.)

 

 
 
 
 

25. You wish to remotely connect to a Cisco Catalyst 2960 switch. Which of the following parameters must be configured on the switch? (Choose 2.)

 
 
 
 

26. IPv6 unique local addresses are similar to IPv4 private IP addresses, because they cannot be routed over the public Internet. A unique local IPv6 address begins with which of the following patterns?

 
 
 
 
 

27. What technology allows an enterprise to more easily change their cloud provider (e.g. change from Microsoft to AWS)?

 
 
 
 

Question 1 of 27