Ccna Boson
171 questions across 0 topics. Use the find bar or section chips to jump to what you need.
What Cisco Lightweight AP mode provides BSSs?
Local (default)
If you enter the show ip route command, what output would indicate a host route?
L /32 (IPv4) L/128 (IPv6)
Authentication
the process of verifying a user's identity
Authorization
the process of verifying the level of access configured for a user
Accounting
the process of recording the use of resources
What are the syslog levels in order?
0 emergencies, 1 alerts, 2 critical, 3 errors, 4 warnings, s5 notifications, 6 informational, 7 debugging
How many ports can you bundle into a single link using LAG?
8 (also depends on network equipment and configuration)
After issuing the 'power inline police action log' command, what will occur when an attached PD attempts to draw more than its allocated power from the configured interface?
the port will restart, and a log message will appear on the console
What happens when you issue the 'power inline police' command?
enables power policing with the default settings
What is enabled by default on Cisco PoE-capable switches?
error-disable detection for inline power
What isn't enabled by default on Cisco PoE-capable switches?
error-disable auto recovery for inline power
What command would you issue to enable error-disable auto recovery?
errdisable recovery cause inline-power
On which interfaces is OSPF broadcast network type enabled by default?
Ethernet and FDDI
On which interfaces is OSPF nonbroadcast netowrk type enabled by default?
Frame relay and X.25
On which interfaces is OSPF point-to-point enabled by default?
HDLC and PPP
What is the command to configure OSPF broadcast network?
ip ospf network broadcast
What is the default hello and dead timer for a broadcast OSPF?
Hello 10 Dead 40
On broadcast OSPF netoworks, are DR and BDR elections performed?
Yes
Manual configurations of the neighbor command are not needed on a broadcast OSPF network because?
Multicast updates are sent
On a OSPF non-broadcast network, are DR and BDR elections performed?
Yes
What is the default hello and dead timer for a non-broadcast OSPF network?
Hello 30 Dead 120
Non-broadcast OSPF networks do not allow what?
multicasts
What is required on OSPF non-broadcast networks?
manual configuration of neighbor routes using the neighbor command
Why is the neighbor command required on OSPF non-broadcast networks?
unicast updates
What is the command to configure an OSPF non-broadcast network? (NBMA)
ip ospf network non-broadcast
What isn't performed on point-to-point OSPF networks?
DR and BDR elections
What isn't required on point-to-point OSPF networks?
the neighbor command
Why isn't the neighbor command reuired on point-to-point OSPF networks?
Multicast updates are sent
What is the default hello and dead timer for a point-to-point OSPF network?
hello 10 dead 40
What is the command to configure an OSPF point-to-point network?
ip ospf network point-to-point
What isn't performed on point-to-multipoint OSPF networks?
DR and BDR elections
What isn't required on OSPF point-to-multipoint networks?
the neighbor command
What is the default hello and dead timer of OSPF point-to-multipoint networks?
hello 30 dead 120
What is the command to configure an OSPF point-to-multipoint broadcast network?
ip ospf network point-to-multipoint
What isn't performed on OSPF point-multipoint non-broadcast networks?
DR and BDR elections
Nonbroadcast OSPF network do not allow what?
multicasts
What is required on an OSPF point-to-multipoint non-broadcast network?
the neighbor command
what is the default hello and dead timer on an OSPF point-to-multipoint non-broadcast network?
hello 30 dead 120
What is the command to configure an OSPF point-to-multipoint non-braodcast network?
ip ospf network point-to-multipoint non-broadcast
HSRP version 1 uses what format for its virtual MAC address?
0000.0C07.ACxx
HSPR version 2 uses what format for its virtual MAC address?
0000.OC9F.Fxxx
What is HSRP?
cisco proprietary protocol that enables multiple routers to function as a single gateway for the network.
In HSRP what does it configure routers to share?
a virtual IP address and a virtual MAC address
Why does HSRP share a virtual IP and MAC address?
They share this so that a group of routers appear as a single device to other hosts
What does HSRP elect?
a single active router and a standby router.
In HSRP, what is elected the active router?
router with the highest priority
In HSRP, what is elected the standby router?
router with the second highest priority
If multiple HSRP routers have the same priority, how will the active router be elected?
router with the highest IP address
To participate in the active and standby election process, how much each HSRP router be configured?
same group
What are the 9 fields in order for an 802.11 MAC frame?
FC, DUR, ADD1, ADD2, ADD3, SEQ, ADD4, DATA, FCS
In an 802.11 frame, the Duration field indicates
transmission times
In an 802.11 frame, the address fields convey
MAC address and BSSID information
In an 802.11 frame, the sequence is subdivided to store what two pieces of information?
fragment number and sequence number of each frame
In an 802.11 frame, DATA contains
user data for data frames and data rates and cipher suites for management frames (frames payload)
In an 802.11 frame, FCS field contains
cyclic redundancy check
SaaS
a model where software is hosted and provide to users through the internet instead of locally
IaaS
a model where computing resources are provided to users over the internet.
PaaS
a model where a complete platform for developing, running, and managing applications is provided to users over the internet.
What is WRED? (Weighted random early detection)
a congestion avoidance mechanism that addresses packet loss caused by tail drop
What is tail drop?
when new incoming packets are dropped because a router's queues are too full to accept them
Why would WRED be useful for networks where the majority of traffic uses TCP?
TCP sources reduce traffic flow when congestion occurs and TCP packets that are dropped must be retransmitted
What prefix will an IPv6 enabled computer use to automatically configure an IPv6 address to itself?
FE80::/10
What is unicast link local addresses used for?
neighbor discovery and for environments where no router is present to provide a routable ipv6 prefix
What is the range of global aggregatable unicast addresses?
2000-3FFF
What is the range of unicast unique-local addresses?
FC00-FDFF
What is the range of ipv6 multicast addresses?
FF00-FFFF
FF01::/16 is what mutlicast scope?
node-local
FF02::/16 is what mutlicast scope?
link-local
FF05::/16 is what mutlicast scope?
unique local
FF08::/16 is what multicasts scope?
organization-local
FF0E::/16 is what multicast scope?
global
What layer 2 attack uses the MAC address of another known host on the network in order to bypass port security measures?
MAC spoofing
What are you most likely to configure by using the Layer 3 security drop-down list box on the Layer 3 tab when configuring WLAN on the WLC GUI?
VPN Pass-through
The 'show ap config general' command
displays IP addressing and other information about the specified AP
The 'show ap config core-dump' command
displays the memory dump for a specific lightweight AP
The 'show ap crash-file' command
displays a list of dump files generated by lightweight APs
Which IPv6 prefix is used for unicast link-local addresses?
FE80::/10?
List the routing protocols in orders of Administrative distance
Directly connected route 0, static route 1, EIGRP summary route 5, eBGP 20, internal EIGRP 90, IGRP 100, OSPF 110, IS-IS 115, RIP 120, external EIGRP 170, iBGP 200, unknown 255
what is the command to create a static route?
ip route
What VLAN is used by dynamic trunking protocl (DTP) to negotiate a trunk link when 802.1Q encapsulation is configured on the interface?
the native vlan
What are the two dynamic modes of operation for a switch port?
auto and desirable
Auto dynamic mode
operates in access mode unless the neighboring interface actively negotiates to operate as a trunk
Desirable dynamic mode
operates in access mode unless it can actively negotiate a trunk connection with a neighboring device
What is the command to change the native vlan?
switchport trunk native vlan
What is the native vlan by defaul in cisco switches?
vlan 1
What term best describes an Ethernet frame that exceeds 1,518 bytes and has a bad FCS value?
giant
What is the name of a frame that is up to 16000 bytes in length?
baby giant
What is the name of a frame that is up to 9,216 bytes in length?
Jumbo
What is the name of a frame that is fewer than 64-bytes and has a bad FCS value?
runt
What is true regarding dynamic interfaces on WLCs?
Dynamic interfaces are user-defined and are typically used for management information
The management interface is used for all
LWAPP communications between the controller and the LAPs
WLCs will use which interface to exchange information?
management interface
A dynamic interface is used to
segment traffic on the WLC
What is the site-to-site VPN IPSec encryption process in order?
sending device encrypts the original packet and session key, sending device encapsulates the encrypted data with new headers, the sending device sends the encrypted packet to the destination, and the destination device decrypts the data and the session key.
A port is configured as what when DAI is enabled on that port?
untrusted port
What is the command to override the default configuration for a given port when DAI is configured for an entire VLAN?
ip arp inspection trust
Which DTP mode actively negotiates a trunk connection with a neighboring interface?
desirable
what does the 'switchport nonegotiate' command do?
dsiables Dynamic Trunking Protocol
What protocol on a cisco switch is used to negotiate whether an interface should be a trunk port or an access point by default?
DTP
what is the command to move an access port to an unused VLAN?
switchport access vlan
what is the command to configure a port as an access port?
switchport mode access
To protect switch interfaces aginst MAC flooding attacks, you should enable
port security on all access mode interfaces on the switch
what is the command to issue port security with defualt settings?
switchport port-security
For EIGRP, what is feasible distance?
the best metric along a path
For EIGRP, what is the successor?
the best path to a destination network
For EIGRP, what is the feasible successor?
a backup path that is guaranteed to be loop-free
For EIGRP, what is the advertised distance?
the metric that the next-hop router has calculated
In OSPF, what must be the same in order to form an adjacency?
same area, area ID and mask, hello and dead timers, authentication, and MTU
What must be unique in order for OSPF to form an adjacency?
router ID
For point-to-point links, what subnet mask should you use?
/30
What does a floating static route provide?
link redundancy
What command should you use to make a router provide IP addresses to the computers on your network over DHCP?
ip dhcp pool 1
after the command ip dhcp pool 1, what should you put?
network
In a controller-based network, what protocols are most likely to be moved to a centralized controller?
EIGRP and OSPF
Which plane does a centralized controller connect by using a northbound API?
the application plane
In a split-MAC deployment, which device is responsible for prioritizing packets and respond to beacon and probe requests?
lightweight AP
What is the WLC responsible for?
client association requests, data encapsulation, client authentication, key exchange, security policy enforcement, and radio frequency management
What does the functionality of a lightweight AP include?
real-time processing of data such as sending and receiving 802.11 traffic, responding to beacons and probe messages, encryption, and packet prioritization.
What does the 'spanning-tree guard root' command do?
preventing a new switch from being elected root
If you want to ensure that a port immediately transition to the STP forwarding state, what should you enable on the port?
PortFast
What is the Rest API encoding format that uses HTML-like tags to define blocks of data?
XML
What command configures an OSPF router to inject its default route into OSPF as an external route and edvertises its default route to neighboring routers that causes the nieghbor routes to become configured with a gateway of last resort?
default-information originate
What best describes an AP deployment that connects APs to a WLC that is housed within a switch stack?
Embedded AP deployment
what is overlay?
creates VXLAN tunnels between SDA switches
what is underlay?
a collection of devices that comprises the IP network that connects to each fabric node
what is northbound API?
enables an SDN controller to communicate with application in the application plane
what is fabric?
the entirety of the overlay network and the underlay network
what is southbound API?
enables an SDN controller to communicate with devices in the data plane.
What is a type of connection that uses the copper wire infrastructure of the PSTN to provide a maximum throughput of 1,544 Mbps?
T1
When connecting two catalyst 6500 switches with fiber-optic cable, upon booting switchA, you receive a SYS-3-TRANCIEVER_NOTAPPROVED error. What is most likely causing the problem?
you installed a third-party SFP module
What wireless QoS level prioritizes video traffic on a Cisco WLAN?
Gold
What wireless QoS level prioritizes VOIP?
Platinum
What is the default setting for wireless QoS?
Silver
What wireless QoS level provides the lowest bandwidth and is typically used for guest services on a Cisco WLAN?
bronze
Which API is typically used to enable communication between an SDN controller and the application plane?
REST and OSGi
What are example of southbound APIs?
NETCONF, OnePK, OpenFlow, and OpFlex
You are configuring layer 2 security on a wlan by using the WLC GUI. You select WPA +WPA 2 from the layer 2 security drop down list box. You want to configure the WPA2 key in hexadecimal format. Which key management method should you select from the Auth Key Mgmt?
PSK
Which of the following is enabled on a Cisco router when you issue the ntp server command from global configuration mode?
static
What is provided by IPSec?
data integrity and confidentiality
What is a MAC multicast address range?
01-00-5E-00-00-00 - 01-00-5E-7F-FF-FF
What is true about unique local unicast IPv6 addresses?
they are unique only within an organization and the first 7 bits of the prefix are always 1111110
You want to decrease the amount of time that it takes for switch ports on switch A to begin forwarding. PortFast is not configured on any of the switch ports on switchA. You issue the 'spanning-tree portfast default' command. Which of the ports will use PortFast?
All access ports
What is true about FfexConnects ACLs?
They are supported on the native VLAN
What device cannot be connected to leaf nodes in the CISCO ACI architecture?
leaf nodes
What is the command you would issue on a switch port so that no more than two devices can send traffic into the port?
switchport port-security maximum 2
What components are used to calculate the EIGRP composite metric by default?
bandwidth and delay
Which application layer protocols use UDP for unsynchronized, connectionless data transfer?
TFTP and SNMP
When issuing the ipv6 enable and no shutdown commands, how many IPv6 addresses are configured on the interface?
one
Gateway Load Balancing Protocol (GLBP)
has one active virtual gateway and multiple active virtual forwarders
Hot Standby Router Protocol (HSRP)
has one active router and one standyby router
Virtual Router Redundancy Protocol (VRRP)
has one master router and multiple backup routers
What is the defualt frequency that a cisco switch will send LLDP advertisements when LLDP is enabled on an interface?
30 seconds
If you have not configured a router with a host name other than the defuault name of Router, when issuing the crypto key generate rsa command, what output will you receive?
Please define a hostname other than Router
What must be configured to enable SSh for VTY on a cisco router?
hostname, ip domain-name, crypto key generate rsa, and transport input ssh
What command should you issue to globally disable LLDP?
no lldp run
What command should you issue in interface configuration mode on a catalyst 2950 switch to make an IP phone trust the CoS priority of incoming data packets generated by the attached host?
switchport priority extend trust
What percent of wireless coverage overlap is considered approriate to ensure that wireless clients do not lose connectivity when roaming from one AP to another?
10 to 15 percent
What is another name for hypervisor?
VMM
Which of the following Cisco managment solutions supports Cisco SDA? (Software defined access)
Disco DNA center
Cisco Prime Infrastructure
relies on a browser-based GUI to enable administrators to perform operations, diagnose problems, and interact with devices on the network.
Cisco Network Assistant
free Java-based desktop application that enables a LAN administrator to perform network operations, diagnose problems, and interact with network devices by using a GUI.
What is used by WPA2 to provide MICs and encryption?
AES and CCMP
What best describes what occurs when a packet must be re-sent because of an interruption that occurs before the 64th byte has been transmitted?
a collision occurs
What will automatically enable SSH on a router?
crypto key generate rsa
Which configuration management tools accepts inbound requests from agents by using HTTPS on TCP port 8140?
Puppet
What is not provided from an IP phone to a catalyst switch by using CDP?
device voice vlan ID
If you want to perform equal-cost load balancing when only a certain amount exists, what should you do to perform equal-cost load balancing over all routes?
maximum-paths
Which of the folloing standards natively includes PortFast, UplinkFast, and backbone Fast?
802.1w
Which of the following best describes a lightweight AP in bridge mode?
it acts as a dedicated connection between two networks.
In a two tier network design, which layers are combined together?
core and distribution
You manually configure the system clock and then issue the ntp server 1.1.1.1 command on a new switch. What should you do to complete a basic NTP client configuration?
nothing
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials