Latihan exam CCNA 106-140

Latihan exam CCNA 106-140

11th Grade

35 Qs

quiz-placeholder

Similar activities

Kuis AIJ - Jaringan Dasar

Kuis AIJ - Jaringan Dasar

11th Grade

30 Qs

LV Networking Revision 1

LV Networking Revision 1

9th - 12th Grade

30 Qs

Practice EXAM CCNA 176-210

Practice EXAM CCNA 176-210

11th Grade

35 Qs

SUBNETTING

SUBNETTING

11th Grade

31 Qs

Module 7 Pre-Assessment

Module 7 Pre-Assessment

11th Grade

30 Qs

AQA Computer Science GCSE - 3.5 Computer networks

AQA Computer Science GCSE - 3.5 Computer networks

10th - 12th Grade

39 Qs

LATIHAN EXAM CCCNA 280-315

LATIHAN EXAM CCCNA 280-315

11th Grade

35 Qs

Latihan exam CCNA 106-140

Latihan exam CCNA 106-140

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Arif Al Muhajit

Used 4+ times

FREE Resource

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Refer to the exhibit. How does router R1 handle traffic to the 172.16.1.4/30 subnet?

A. It sends all traffic over the path via 172.16.4.4.

B. It sends all traffic over the path via 10.0.1.100.

C. It load-balances traffic over 172.16.9.5 and 172.16.4.4.

D. It sends all traffic over the path via 172.16.9.5 using 172.16.4.4 as a backup.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An engineer configured an OSPF neighbor as a designated router. Which state verifies the designated router is in the proper mode?

A. 2-way

B. Full

C. Exchange

D. lnit

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user's smartphone being lost or stolen?

A. The application requires an administrator password to reactivate after a configured interval.

B. The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted.

C. The application requires the user to enter a PlN before it provides the second factor.

D. The application verifies that the user is in a specific location before it provides the second factor.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A packet from a company's branch office is destined to host 172.31.0.1 at headquarters. The sending router has three possible matches in its routing table for the packet prefixes 172.31.0.0/16,172.31.0.0/24, and 172.31.0.0/25. How does the router handle the packet?

A. It sends the traffic via prefix 172.31.0.0/24.

B. It sends the traffic via the default gateway 0.0.0.0/0.

C. It sends the traffic via prefix 172.31.0.0/16.

D. It sends the traffic via prefix 172.31.0.0/25.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What configuration management mechanism uses TCP port 22 by default when communicating with managed nodes?

A. Puppet

B. Chef

B.Python

D. Ansible

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How do servers connect to the network in a virtual environment?

A. a software switch on a hypervisor that is physically connected to the network

B. wireless to an access point that is physically connected to the network

C. a virtual switch that links to an access point that is physically connected to the network

D. a cable connected to a physical switch onthe network

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Refer to the exhibit. What is a reason for poor performance on the network interface?

A. The interface is receiving excessive broadcast traffic.

B. The cable connection between the two devices is faulty.

C. The interface is operating at a different speed than the connected device.

D. The bandwidth setting of the interface is misconfigured.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?