ExamGecko
Home Home / Cisco / CCST-Networking

Cisco CCST-Networking Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

In the network shown in the following graphic, Switch1 is a Layer 2 switch.

PC-A sends a frame to PC-C. Switch1 does not have a mapping entry for the MAC address of PC-C. Which action does Switch1 take?

A.

Switch1 queries Switch2 for the MAC address of PC-C.

A.

Switch1 queries Switch2 for the MAC address of PC-C.

Answers
B.

Switch1 drops the frame and sends an error message back to PC-A.

B.

Switch1 drops the frame and sends an error message back to PC-A.

Answers
C.

Switch1 floods the frame out all active ports except port G0/1.

C.

Switch1 floods the frame out all active ports except port G0/1.

Answers
D.

Switch1 sends an ARP request to obtain the MAC address of PC-C.

D.

Switch1 sends an ARP request to obtain the MAC address of PC-C.

Answers
Suggested answer: B

Explanation:

In a network, when a Layer 2 switch (like Switch1) receives a frame destined for a MAC address that is not in its MAC address table, it performs a flooding operation. This means the switch will send the frame out of all ports except the port on which the frame was received. This flooding ensures that if the destination device is connected to one of the other ports, it will receive the frame and respond, allowing the switch to learn its MAC address.

A . Switch1 queries Switch2 for the MAC address of PC-C: This does not happen in Layer 2 switches; they do not query other switches for MAC addresses.

A . Switch1 drops the frame and sends an error message back to PC-A: This is not the default behavior for unknown unicast frames.

D . Switch1 sends an ARP request to obtain the MAC address of PC-C: ARP is used by devices to map IP addresses to MAC addresses, not by switches to find unknown MAC addresses.

Thus, the correct answer is B. Switch1 floods the frame out all active ports except port G0/1.

Cisco Layer 2 Switching Overview

Switching Mechanisms (Cisco)

HOTSPOT

You purchase a new Cisco switch, turn it on, and connect to its console port. You then run the following command:

For each statement about the output, select True or False.

Note: You will receive partial credit for each correct selection.


Question 2
Correct answer: Question 2

Explanation:

Cisco IOS Interface Configuration: Cisco Interface Configuration

Understanding Cisco Switch Interfaces: Cisco Switch Interfaces

Which command will display all the current operational settings configured on a Cisco router?

A.

show protocols

A.

show protocols

Answers
B.

show startup-config

B.

show startup-config

Answers
C.

show version

C.

show version

Answers
D.

show running-config

D.

show running-config

Answers
Suggested answer: D

Explanation:

The show running-config command is used on a Cisco router to display the current operational settings that are actively configured in the router's RAM. This command outputs all the configurations that are currently being executed by the router, which includes interface configurations, routing protocols, access lists, and other settings. Unlike show startup-config, which shows the saved configuration that the router will use on the next reboot, show running-config reflects the live, current configuration in use.

show running-config: This command displays the current configuration running on the router. It includes all the operational settings and configurations applied to the router.

show protocols: This command shows the status of configured protocols on the router but not the entire configuration.

show startup-config: This command displays the configuration saved in NVRAM, which is used to initialize the router on startup, but not necessarily the current running configuration.

show version: This command provides information about the router's software version, hardware components, and uptime but does not display the running configuration.

Cisco IOS Commands: Cisco IOS Commands

DRAG DROP

Examine the connections shown in the following image. Move the cable types on the right to the appropriate connection description on the left. You may


Question 4
Correct answer: Question 4

Explanation:

Network Cable Types and Uses: Cisco Network Cables

Understanding Ethernet Cabling: Ethernet Cable Guide

DRAG DROP

Move each cloud computing service model from the list on the left to the correct example on the right

Note: You will receive partial credit for each correct answer.


Question 5
Correct answer: Question 5

Explanation:

Cloud Service Models: Understanding IaaS, PaaS, SaaS

NIST Definition of Cloud Computing: NIST Cloud Computing

Examine the following output:

Which two conclusions can you make from the output of the tracert command? (Choose 2.)

Note: You will receive partial credit for each correct answer.

A.

The trace successfully reached the www.cisco.com server.

A.

The trace successfully reached the www.cisco.com server.

Answers
B.

The trace failed after the fourth hop.

B.

The trace failed after the fourth hop.

Answers
C.

The IPv6 address associated with the www.cisco.com server is 2600:1408: c400: 38d: : b33.

C.

The IPv6 address associated with the www.cisco.com server is 2600:1408: c400: 38d: : b33.

Answers
D.

The routers at hops 5 and 6 are offline.

D.

The routers at hops 5 and 6 are offline.

Answers
E.

The device sending the trace has IPv6 address 2600:1408:c400:38d :: b33.

E.

The device sending the trace has IPv6 address 2600:1408:c400:38d :: b33.

Answers
Suggested answer: A, C

Explanation:

* Statement A: 'The trace successfully reached the www.cisco.com server.' This is true as indicated by the 'Trace complete' message at the end, showing that the trace has reached its destination.

* Statement C: 'The IPv6 address associated with the www.cisco.com server is 2600:1408:c400:38d::b33.' This is true because the final hop in the trace, which is the destination, has this IPv6 address.

* Statement B: 'The trace failed after the fourth hop.' This is incorrect as the trace continues beyond the fourth hop, despite some intermediate timeouts.

* Statement D: 'The routers at hops 5 and 6 are offline.' This is not necessarily true. The routers might be configured to not respond to traceroute requests.

* Statement E: 'The device sending the trace has IPv6 address 2600:1408:c400:38d::b33.' This is incorrect; this address belongs to the destination server, not the sender.

* Understanding Traceroute: Traceroute Guide

DRAG DROP

Move the MFA factors from the list on the left to their correct examples on the right. You may use each factor once, more than once, or not at all.

Note: You will receive partial credit for each correct selection.


Question 7
Correct answer: Question 7

Explanation:

Multi-Factor Authentication (MFA) Explained: MFA Guide

Understanding Authentication Factors: Authentication Factors

A Cisco switch is not accessible from the network. You need to view its running configuration.

Which out-of-band method can you use to access it?

A.

SNMP

A.

SNMP

Answers
B.

Console

B.

Console

Answers
C.

SSH

C.

SSH

Answers
D.

Telnet

D.

Telnet

Answers
Suggested answer: B

Explanation:

When a Cisco switch is not accessible from the network, the recommended out-of-band method to access its running configuration is through the console port. Out-of-band management involves accessing the network device through a dedicated management channel that is not part of the data network. The console port provides direct access to the switch's Command Line Interface (CLI) without using the network, which is essential when the switch cannot be accessed remotely via the network12.

Out-of-band (OOB) network interface configuration guidelines

Out of band management configuration

=========================

If you have any more questions or need further assistance, feel free to ask!

A user reports that a company website is not available. The help desk technician issues a tracert command to determine if the server hosting the website is reachable over the network. The output of the command is shown as follows:

What can you tell from the command output?

A.

The router at hop 3 is not forwarding packets to the IP address 192.168.1.10.

A.

The router at hop 3 is not forwarding packets to the IP address 192.168.1.10.

Answers
B.

The server address 192.168.1.10 is being blocked by a firewall on the router at hop 3.

B.

The server address 192.168.1.10 is being blocked by a firewall on the router at hop 3.

Answers
C.

The server with the address 192.168.1.10 is reachable over the network.

C.

The server with the address 192.168.1.10 is reachable over the network.

Answers
D.

Requests to the web server at 192.168.1.10 are being delayed and time out.

D.

Requests to the web server at 192.168.1.10 are being delayed and time out.

Answers
Suggested answer: C

Explanation:

The tracert command output shows the path taken to reach the destination IP address, 192.168.1.10. The command output indicates:

* Hops 1 and 2 are successfully reached.

* Hop 3 times out, meaning the router at hop 3 did not respond to the tracert request. However, this does not necessarily indicate a problem with forwarding packets, as some routers may be configured to block or not respond to ICMP requests.

* Hops 4 and 5 are successfully reached, with hop 5 being the destination IP 192.168.1.10, indicating that the server is reachable.

Thus, the correct answer is C. The server with the address 192.168.1.10 is reachable over the network.

* Cisco Traceroute Command

* Understanding Traceroute

The tracert command output indicates that the server with the address 192.168.1.10 is reachable over the network. The asterisk (*) at hop 3 suggests that the probe sent to that hop did not return a response, which could be due to a variety of reasons such as a firewall blocking ICMP packets or the router at that hop being configured not to respond to ICMP requests. However, since the subsequent hops (4 and 5) are showing response times, it means that the packets are indeed getting through and the server is reachable12.

* How to Use Traceroute Command to Read Its Results

* How to Use the Tracert Command in Windows

Which wireless security option uses a pre-shared key to authenticate clients?

A.

WPA2-Personal

A.

WPA2-Personal

Answers
B.

802.1x

B.

802.1x

Answers
C.

802.1q

C.

802.1q

Answers
D.

WPA2-Enterprise

D.

WPA2-Enterprise

Answers
Suggested answer: A

Explanation:

WPA2-Personal, also known as WPA2-PSK (Pre-Shared Key), is the wireless security option that uses a pre-shared key to authenticate clients. This method is designed for home and small office networks and doesn't require an authentication server. Instead, every user on the network uses the same key or passphrase to connect1.

* What is a Wi-Fi Protected Access Pre-Shared Key (WPA-PSK)?

* Exploring WPA-PSK and WiFi Security

=========================

* WPA2-Personal: This wireless security option uses a pre-shared key (PSK) for authentication. Each client that connects to the network must use this key to gain access. It is designed for home and small office networks where simplicity and ease of use are important.

* WPA2-Enterprise: Unlike WPA2-Personal, WPA2-Enterprise uses 802.1x authentication with an authentication server (such as RADIUS) and does not rely on a pre-shared key.

* 802.1x: This is a network access control protocol for LANs, particularly wireless LANs. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.

* 802.1q: This is a networking standard that supports VLAN tagging on Ethernet networks and is not related to wireless security.

* Cisco Documentation on WPA2 Security: Cisco WPA2

* Understanding Wireless Security: Wireless Security Guide

Total 40 questions
Go to page: of 4