Cisco CCST-Networking Practice Test - Questions Answers

List of questions
Question 1

In the network shown in the following graphic, Switch1 is a Layer 2 switch.
PC-A sends a frame to PC-C. Switch1 does not have a mapping entry for the MAC address of PC-C. Which action does Switch1 take?
Switch1 queries Switch2 for the MAC address of PC-C.
Switch1 drops the frame and sends an error message back to PC-A.
Switch1 floods the frame out all active ports except port G0/1.
Switch1 sends an ARP request to obtain the MAC address of PC-C.
In a network, when a Layer 2 switch (like Switch1) receives a frame destined for a MAC address that is not in its MAC address table, it performs a flooding operation. This means the switch will send the frame out of all ports except the port on which the frame was received. This flooding ensures that if the destination device is connected to one of the other ports, it will receive the frame and respond, allowing the switch to learn its MAC address.
A . Switch1 queries Switch2 for the MAC address of PC-C: This does not happen in Layer 2 switches; they do not query other switches for MAC addresses.
A . Switch1 drops the frame and sends an error message back to PC-A: This is not the default behavior for unknown unicast frames.
D . Switch1 sends an ARP request to obtain the MAC address of PC-C: ARP is used by devices to map IP addresses to MAC addresses, not by switches to find unknown MAC addresses.
Thus, the correct answer is B. Switch1 floods the frame out all active ports except port G0/1.
Cisco Layer 2 Switching Overview
Switching Mechanisms (Cisco)
Question 2

HOTSPOT
You purchase a new Cisco switch, turn it on, and connect to its console port. You then run the following command:
For each statement about the output, select True or False.
Note: You will receive partial credit for each correct selection.
Cisco IOS Interface Configuration: Cisco Interface Configuration
Understanding Cisco Switch Interfaces: Cisco Switch Interfaces
Question 3

Which command will display all the current operational settings configured on a Cisco router?
show protocols
show startup-config
show version
show running-config
The show running-config command is used on a Cisco router to display the current operational settings that are actively configured in the router's RAM. This command outputs all the configurations that are currently being executed by the router, which includes interface configurations, routing protocols, access lists, and other settings. Unlike show startup-config, which shows the saved configuration that the router will use on the next reboot, show running-config reflects the live, current configuration in use.
show running-config: This command displays the current configuration running on the router. It includes all the operational settings and configurations applied to the router.
show protocols: This command shows the status of configured protocols on the router but not the entire configuration.
show startup-config: This command displays the configuration saved in NVRAM, which is used to initialize the router on startup, but not necessarily the current running configuration.
show version: This command provides information about the router's software version, hardware components, and uptime but does not display the running configuration.
Cisco IOS Commands: Cisco IOS Commands
Question 4

DRAG DROP
Examine the connections shown in the following image. Move the cable types on the right to the appropriate connection description on the left. You may
Network Cable Types and Uses: Cisco Network Cables
Understanding Ethernet Cabling: Ethernet Cable Guide
Question 5

DRAG DROP
Move each cloud computing service model from the list on the left to the correct example on the right
Note: You will receive partial credit for each correct answer.
Cloud Service Models: Understanding IaaS, PaaS, SaaS
NIST Definition of Cloud Computing: NIST Cloud Computing
Question 6

Examine the following output:
Which two conclusions can you make from the output of the tracert command? (Choose 2.)
Note: You will receive partial credit for each correct answer.
The trace successfully reached the www.cisco.com server.
The trace failed after the fourth hop.
The IPv6 address associated with the www.cisco.com server is 2600:1408: c400: 38d: : b33.
The routers at hops 5 and 6 are offline.
The device sending the trace has IPv6 address 2600:1408:c400:38d :: b33.
* Statement A: 'The trace successfully reached the www.cisco.com server.' This is true as indicated by the 'Trace complete' message at the end, showing that the trace has reached its destination.
* Statement C: 'The IPv6 address associated with the www.cisco.com server is 2600:1408:c400:38d::b33.' This is true because the final hop in the trace, which is the destination, has this IPv6 address.
* Statement B: 'The trace failed after the fourth hop.' This is incorrect as the trace continues beyond the fourth hop, despite some intermediate timeouts.
* Statement D: 'The routers at hops 5 and 6 are offline.' This is not necessarily true. The routers might be configured to not respond to traceroute requests.
* Statement E: 'The device sending the trace has IPv6 address 2600:1408:c400:38d::b33.' This is incorrect; this address belongs to the destination server, not the sender.
* Understanding Traceroute: Traceroute Guide
Question 7

DRAG DROP
Move the MFA factors from the list on the left to their correct examples on the right. You may use each factor once, more than once, or not at all.
Note: You will receive partial credit for each correct selection.
Multi-Factor Authentication (MFA) Explained: MFA Guide
Understanding Authentication Factors: Authentication Factors
Question 8

A Cisco switch is not accessible from the network. You need to view its running configuration.
Which out-of-band method can you use to access it?
Question 9

A user reports that a company website is not available. The help desk technician issues a tracert command to determine if the server hosting the website is reachable over the network. The output of the command is shown as follows:
What can you tell from the command output?
Question 10

Which wireless security option uses a pre-shared key to authenticate clients?
Question