Search Header Logo

CCNA 3 Final Exam 52-100

Authored by Rau Kk

Special Education

University

Used 1+ times

CCNA 3 Final Exam 52-100
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

The leaf switches always attach to the spines, but they never attach to each other.

The leaf switches always attach to the spines and they are interlinked through a trunk line.

The spine switches attach to the leaf switches and attach to each other for redundancy.

The spine and leaf switches are always linked through core switches.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two scenarios would result in a duplex mismatch? (Choose two.)

connecting a device with autonegotiation to another that is manually set to full-duplex

manually setting the two connected devices to different duplex modes

starting and stopping a router interface during a normal operation

connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps

configuring dynamic routing incorrectly

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?

authenticates a packet by using either the HMAC with MD5 method or the SHA method

authenticates a packet by a string match of the username or community string

authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA algorithms and encrypts the packet with either the DES, 3DES or AES algorithms

authenticates a packet by using the SHA algorithm only

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two types of attacks used on DNS open resolvers? (Choose two.)

amplification and reflection

resource utilization

fast flux

ARP poisoning

cushioning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet .

If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied?

denied

permitted

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.0.15 eq telnet .

If a packet with a source address of 192.168.100.219, a destination address of 64.100.40.10, and a protocol of 54 is received on the interface, is the packet permitted or denied?

denied

permitted

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of resources are required for a Type 1 hypervisor?

a management console

a host operating system

a dedicated VLAN

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?