CCNA 3 Final Exam 52-100

CCNA 3 Final Exam 52-100

University

50 Qs

quiz-placeholder

Similar activities

ОЦН 205-255

ОЦН 205-255

University

51 Qs

AWS CLF-C02 Practised Exam 4

AWS CLF-C02 Practised Exam 4

University

45 Qs

Bài Quiz không có tiêu đề

Bài Quiz không có tiêu đề

11th Grade - University

51 Qs

Датчики автомобилей

Датчики автомобилей

University

50 Qs

Manajemen Keuangan

Manajemen Keuangan

University

50 Qs

Pendalaman Materi tentang Induksi matematika dan teori bilangan

Pendalaman Materi tentang Induksi matematika dan teori bilangan

University

50 Qs

Chess

Chess

2nd Grade - Professional Development

50 Qs

Review unit 4 part 4

Review unit 4 part 4

University

52 Qs

CCNA 3 Final Exam 52-100

CCNA 3 Final Exam 52-100

Assessment

Quiz

Special Education

University

Medium

Created by

Rau Kk

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

The leaf switches always attach to the spines, but they never attach to each other.

The leaf switches always attach to the spines and they are interlinked through a trunk line.

The spine switches attach to the leaf switches and attach to each other for redundancy.

The spine and leaf switches are always linked through core switches.

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two scenarios would result in a duplex mismatch? (Choose two.)

connecting a device with autonegotiation to another that is manually set to full-duplex

manually setting the two connected devices to different duplex modes

starting and stopping a router interface during a normal operation

connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps

configuring dynamic routing incorrectly

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?

authenticates a packet by using either the HMAC with MD5 method or the SHA method

authenticates a packet by a string match of the username or community string

authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA algorithms and encrypts the packet with either the DES, 3DES or AES algorithms

authenticates a packet by using the SHA algorithm only

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two types of attacks used on DNS open resolvers? (Choose two.)

amplification and reflection

resource utilization

fast flux

ARP poisoning

cushioning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet .

If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied?

denied

permitted

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An ACL is applied inbound on a router interface. The ACL consists of a single entry:

access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.0.15 eq telnet .

If a packet with a source address of 192.168.100.219, a destination address of 64.100.40.10, and a protocol of 54 is received on the interface, is the packet permitted or denied?

denied

permitted

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of resources are required for a Type 1 hypervisor?

a management console

a host operating system

a dedicated VLAN

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?