CCNA 2 Pretest Exam Answers (v5.03 + v5.1 + v6.0) – 100% Result

Certification Answers

The CCNA 2 Pretest Exam Answers (v5.03 + v5.1 + v6.0) is an important step towards obtaining the CCNA certification. This exam is designed to test a candidate's knowledge and understanding of various networking concepts and protocols, including local area networks (LANs), wide area networks (WANs), and network security. To pass the CCNA 2 Pretest Exam, it is essential to have a good understanding of these concepts and be able to apply them in real-world scenarios.

The exam consists of multiple-choice questions and is usually taken online. The questions cover various topics such as IP addressing, subnetting, routing protocols, and network security. To prepare for the CCNA 2 Pretest Exam, it is important to study the official CCNA curriculum and practice with online resources such as practice exams, flashcards, and quizzes.

Certificationanswersout.com is dedicated to providing you with the best resources to help you succeed in your exams. If you have new questions on a test, simply leave a comment with the question and multiple-choice options. Our team of experts will promptly update the answers for you, ensuring that you have the most accurate and up-to-date information. We understand the importance of passing exams and value your contributions to our website. Your input helps us maintain the high-quality content that you have come to expect from us. Thank you for choosing our website as your study resource.

Q1. Which two components are configured via software in order for a PC to participate in a network environment? (Choose two.)

  • MAC address
  • IP address
  • kernel
  • shell
  • subnet mask
Explanation:  No answer description available for this question

Q2. What is the correct order for PDU encapsulation?

Explanation:  No answer description available for this question

Q3. Which advantage does the store-and-forward switching method have compared with the cut-through switching method?

  • frame error checking
  • faster frame forwarding
  • frame forwarding using IPv4 Layer 3 and 4 information
  • collision detecting
Explanation:  A switch using the store-and-forward switching method performs an error check on an incoming frame by comparing the FCS value against its own FCS calculations after the entire frame is received. In comparison, a switch using the cut-through switching method makes quick forwarding decisions and starts the forwarding process without waiting for the entire frame to be received. Thus a switch using cut-through switching may send invalid frames to the network. The performance of store-and-forward switching is slower compared to cut-through switching performance. Collision detection is monitored by the sending device. Store-and-forward switching does not use IPv4 Layer 3 and 4 information for its forwarding decisions.

Q4. To revert to a previous configuration, an administrator issues the command copy tftp startup-config on a router and enters the host address and file name when prompted. After the command is completed, why does the current configuration remain unchanged?

  • The command should have been copy startup-config tftp.
  • The configuration should have been copied to the running configuration instead.
  • The configuration changes were copied into RAM and require a reboot to take effect.
  • A TFTP server can only be used to restore the Cisco IOS, not the router configuration.
Explanation:  No answer description available for this question

Q5. A small car dealership has a scanner that is attached to the PC of the sales manager. When salesmen need to scan a document, they place the document in the scanner and use their own PCs to control the scanner through software on the PC of the manager. After the document is scanned, they can attach it to an email or upload it into the sales software. What type of network model does this scenario describe?

  • client/server
  • packet-switched
  • peer-to-peer
  • centralized
  • hierarchical
Explanation:  No answer description available for this question

Q6. Which media access method requires that an end device send a notification across the media before sending data?

  • CSMA/CA
  • CSMA/CD
  • deterministic
  • token passing
Explanation:  No answer description available for this question

Q7. Refer to the exhibit. PC1 is configured to obtain a dynamic IP address from the DHCP server. PC1 has been shut down for two weeks. When PC1 boots and tries to request an available IP address, which destination IP address will PC1 place in the IP header?

  • 192.168.1.1
  • 192.168.1.8
  • 192.168.1.255
  • 255.255.255.255
Explanation:  When a host boots and has been configured for dynamic IP addressing, the device tries to obtain a valid IP address. It sends a DHCPDISCOVER message. This is a broadcast message because the DHCP server address is unknown (by design). The destination IP address in the IP header is 255.255.255.255 and the destination MAC address is FF:FF:FF:FF:FF:FF.

Q8. Which statement is true about IPv6 addresses?

  • Global unicast addresses are globally unique and can be routed through the Internet.
  • Link-local addresses must be unique.
  • A loopback address is represented by ::/128.
  • Unique local addresses are used to communicate with other devices on the same link.
Explanation:  No answer description available for this question

Q9. Refer to the exhibit. Which IP addressing scheme should be changed?

  • Site 1
  • Site 2
  • Site 3
  • Site 4
Explanation:  No answer description available for this question

Q10. What is the most effective way to mitigate worm and virus attacks?

  • Secure all Layer 2 devices.
  • Ensure that users change their passwords often.
  • Deploy packet filtering firewalls at the network edge.
  • Install security updates to patch vulnerable systems.
Explanation:  No answer description available for this question

Q11. A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

  • ipconfig /all
  • arp -a
  • ipconfig /displaydns
  • nslookup
Explanation:  No answer description available for this question

Q12. Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?

  • letmein
  • secretin
  • lineconin
  • linevtyin
Explanation:  Telnet accesses a network device through the virtual interface configured with the line VTY command. The password configured under this is required to access the user EXEC mode. The password configured under the line console 0 command is required to gain entry through the console port, and the enable and enable secret passwords are used to allow entry into the privileged EXEC mode.

Q13. In performing a protocol analysis of a network, when should traffic be captured to ensure the most accurate representation of the different traffic types on the network?

  • during software upgrades
  • during times of moderate network use
  • during hours of peak network use
  • during weekends and holidays when network use is light
Explanation:  No answer description available for this question

Q14. Refer to the exhibit. A TCP segment from a server has been captured by Wireshark, which is running on a host. What acknowledgement number will the host return for the TCP segment that has been received?

  • 2
  • 21
  • 250
  • 306
  • 2921
Explanation:  No answer description available for this question

Q15. Refer to the exhibit. What is the link-local IPv6 address of the local computer shown based on the output of the netstat -r command?

  • ::1/128
  • 2001::/32
  • 2001:db8:9d38:953c:1c53:2271:9c9a:c62c/128
  • fe80::/64
  • fe80::13e:4586:5807:95f7/128
Explanation:  No answer description available for this question

Q16. A network administrator is checking the system logs and notices unusual connectivity tests to multiple well-known ports on a server. What kind of potential network attack could this indicate?

  • access
  • reconnaissance
  • denial of service
  • information theft
Explanation:  No answer description available for this question

Q17. Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address?

  • ARP
  • DNS
  • NAT
  • SMB
  • DHCP
  • HTTP
Explanation:  Network Address Translation (NAT) is a technology implemented within IPv4 networks. One application of NAT is to use a few public IP addresses to be shared by many internal network hosts which use private IP addresses. NAT removes the need for public addresses for every internal host. It therefore provides a solution to slow down the IPv4 address depletion.

Q18. What happens when part of an Internet television transmission is not delivered to the destination?

  • A delivery failure message is sent to the source host.
  • The part of the television transmission that was lost is re-sent.
  • The entire transmission is re-sent.
  • The transmission continues without the missing portion.
Explanation:  No answer description available for this question

Q19. Which three IP addresses are public? (Choose three.)

  • 10.1.1.1
  • 128.107.0.7 
  • 192.31.7.10
  • 172.16.4.4
  • 192.168.5.5
  • 64.104.7.7
Explanation:  No answer description available for this question

Q20. A host is accessing an FTP server on a remote network. Which three functions are performed by intermediary network devices during this conversation? (Choose three.)

  • regenerating data signals
  • acting as a client or a server
  • providing a channel over which messages travel
  • applying security settings to control the flow of data 
  • notifying other devices when errors occur
  • serving as the source or destination of the messages
Explanation:  No answer description available for this question

Q21. Which IP address is a valid network address?

  • 172.16.4.32/27
  • 172.16.4.79/28
  • 172.16.4.255/22
  • 172.16.5.255/23
Explanation:  No answer description available for this question

Q22. What is the range of host IP addresses for the subnet 172.16.1.32/28?

  • 172.16.1.33 – 172.16.1.38
  • 172.16.1.33 – 172.16.1.46
  • 172.16.1.33 – 172.16.1.62
  • 172.16.1.32 – 172.16.1.39
  • 172.16.1.32 – 172.16.1.47
Explanation:  No answer description available for this question

Q23. An organization has received the IPv6 network prefix of 2001:db8:1234::/52 from their ISP. How many subnets can be created from this prefix without borrowing bits from the interface ID?

  • 1024
  • 4096 
  • 8192
  • 65536
Explanation:  No answer description available for this question

Q24. Match the application protocols to the correct transport protocols.

Explanation:  No answer description available for this question

Q25. Which type of static route is configured with a greater administrative distance to provide a backup route to a route learned from a dynamic routing protocol?

  • Standard static route
  • Summary static route
  • Floating static route
  • Default static route
Explanation:  There are four basic types of static routes. Floating static routes are backup routes that are placed into the routing table if a primary route is lost. A summary static route aggregates several routes into one, reducing the of the routing table. Standard static routes are manually entered routes into the routing table. Default static routes create a gateway of last resort.

Q26. Which information does a switch use to populate the MAC address table?

  • The source and destination MAC addresses and the incoming port
  • The source MAC address and the outgoing port
  • The destination MAC address and the outgoing port
  • The destination MAC address and the incoming port
  • The source and destination MAC addresses and the outgoing port
  • The source MAC address and the incoming port
Explanation:  To maintain the MAC address table, the switch uses the source MAC address of the incoming packets and the port that the packets enter. The destination address is used to select the outgoing port.

Q27. What is the reason why the DHCPREQUEST message is sent as a broadcast during the DHCPv4 process?

  • For hosts on other subnets to receive the information
  • For routers to fill their routing tables with this new information
  • To notify other DHCP servers on the subnet that the IP address was leased
  • To notify other hosts not to request the same IP address
Explanation:  No answer description available for this question

Q28. Which type of traffic would most likely have problems when passing through a NAT device?

  • Telnet
  • IPsec
  • HTTP
  • ICMP
  • DNS
Explanation:  No answer description available for this question

Q29. Refer to the exhibit. An administrator is examining the message in a syslog server. What can be determined from the message?

  • This is an error message that indicates the system in unusable
  • This is an error message for which warning conditions exist
  • This is an alert message for which immediate action is needed
  • This is a notification message for a normal but significant condition
Explanation:  No answer description available for this question

Q30. Conpared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)

  • They take less time to converge when the network topology changes
  • They improve network security
  • They improve the efficiency of discovering neighbouring networks
  • They automatically switch the path to the destination network when the topology changes
  • They use fewer router resources
Explanation:  No answer description available for this question

Q31. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question.What is the secret keyword that is displayed on the web page?

  • router
  • switch
  • frame
  • packet
  • cisco
Explanation:  No answer description available for this question

Q32. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which IPv6 address is assigned to the Serial0/0/0 interface on RT2?

  • 2001:db8:abc:1::1
  • 2001:db8:abc:5::1
  • 2001:db8:abc:5::2
  • 2001:db8:abc:10::15
Explanation:  No answer description available for this question

Q33. What is the purpose of a routing protocol?

  • It is used to build and maintain ARP tables.
  • It provides a method for segmenting and reassembling data packets.
  • It allows an administrator to devise an addressing scheme for the network.
  • It allows a router to share information about known networks with other routers.
  • It provides a procedure for encoding and decoding data into bits for packet forwarding.
Explanation:  No answer description available for this question

Q34. ACLs are used primarily to filter traffic. What are two additional uses of ACLs? (Choose two.)

  • specifying source addresses for authentication
  • specifying internal hosts for NAT 
  • identifying traffic for QoS
  • reorganizing traffic into VLANs
  • filtering VTP packets
Explanation:  ACLs are used to filter traffic to determine which packets will be permitted or denied through the router and which packets will be subject to policy-based routing. ACLs can also be used to identify traffic that requires NAT and QoS services. Prefix lists are used to control which routes will be redistributed or advertised to other routers.

Q35. What are two functions of a router? (Choose two.)

  • It connects multiple IP networks.
  • It controls the flow of data via the use of Layer 2 addresses.
  • It determines the best path to send packets.
  • It manages the VLAN database.
  • It increases the size of the broadcast domain.
Explanation:  No answer description available for this question

Q36. Employees of a company connect their wireless laptop computers to the enterprise LAN via wireless access points that are cabled to the Ethernet ports of switches. At which layer of the three-layer hierarchical network design model do these switches operate?

  • core
  • physical
  • access
  • distribution
  • data link
Explanation:  No answer description available for this question

Q37. Which statement describes a route that has been learned dynamically?

  • It is automatically updated and maintained by routing protocols.
  • It is unaffected by changes in the topology of the network.
  • It has an administrative distance of 1.
  • It is identified by the prefix C in the routing table.
Explanation:  Dynamically learned routes are constantly updated and maintained by routing protocols.

Q38. Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227?

  • Drop the packet.
  • Send the packet out the Serial0/0/0 interface.
  • Send the packet out the GigabitEthernet0/0 interface.
  • Send the packet out the GigabitEthernet0/1 interface.
Explanation:  After a router determines the destination network by ANDing the destination IP address with the subnet mask, the router examines the routing table for the resulting destination network number. When a match is found, the packet is sent to the interface associated with the network number. When no routing table entry is found for the particular network, the default gateway or gateway of last resort (if configured or known) is used. If there is no gateway of last resort, the packet is dropped. In this instance, the 192.168.12.224 network is not found in the routing table and the router uses the gateway of last resort. The gateway of last resort is the IP address of 209.165.200.226. The router knows this is an IP address that is associated with the 209.165.200.224 network. The router then proceeds to transmit the packet out the Serial0/0/0 interface, or the interface that is associated with 209.165.200.224.

Q39. A network administrator is configuring a new Cisco switch for remote management access. Which three items must be configured on the switch for the task? (Choose three.)

  • loopback address
  • default gateway
  • IP address
  • vty lines
  • VTP domain
  • default VLAN
Explanation:  No answer description available for this question

Q40. Which type of traffic is designed for a native VLAN?

  • untagged
  • management
  • user-generated
  • tagged
Explanation:  A native VLAN carries untagged traffic, which is traffic that does not come from a VLAN. A data VLAN carries user-generated traffic. A management VLAN carries management traffic.

Q41. Compared with dynamic routes, what are two advantages of using static routes on a router? (Choose two.)

  • They use fewer router resources.
  • They improve the efficiency of discovering neighboring networks.
  • They take less time to converge when the network topology changes.
  • They improve netw​ork security.
  • They automatically switch the path to the destination network when the topology changes.
Explanation:  Static routes are manually configured on a router. Static routes are not automatically updated and must be manually reconfigured if the network topology changes. Thus static routing improves network security because it does not make route updates among neighboring routers. Static routes also improve resource efficiency by using less bandwidth, and no CPU cycles are used to calculate and communicate routes.

Q42. Which three advantages are provided by static routing? (Choose three.)

  • Static routing does not advertise over the network, thus providing better security.
  • Configuration of static routes is error-free.
  • Static routes scale well as the network grows.
  • Static routing typically uses less network bandwidth and fewer CPU operations than dynamic routing does.
  • The path a static route uses to send data is known. 
  • No intervention is required to maintain changing route information.
Explanation:  Static routes are prone to errors from incorrect configuration by the administrator. They do not scale well, because the routes must be manually reconfigured to accommodate a growing network. Intervention is required each time a route change is necessary. They do provide better security, use less bandwidth, and provide a known path to the destination.

Q43. What is the most likely scenario in which the WAN interface of a router would be configured as a DHCP client to be assigned a dynamic IP address from an ISP?

  • There is a web server for public access on the LAN that is attached to the router.
  • The router is also the gateway for a LAN.
  • It is a SOHO or home broadband router.
  • The router is configured as a DHCP server.
Explanation:  SOHO and home broadband routers are typically set to acquire an IPv4 address automatically from the ISP. The IP address that is assigned is typically a dynamic address to reduce the cost, but a static IP address is possible with more cost. However, if the router is assigned a dynamic IP address, DNS issues will result in the web server behind the router not being easily accessible to the public. Routers are typically also gateways for LANs, but this has no bearing on whether the router is configured as a DHCP client on its WAN link or not. Likewise, a router can be configured to be a DHCP client in order to obtain an IP address from the ISP, but at the same time, it can be configured as a DHCP server to serve the IP addressing for the devices on its LAN.

Q44. What are two characteristics of link-state protocols compared to distance vector protocols? (Choose two.)

  • They require a lot of hardware resources.
  • They know of the network topology from the perspective of their neighbors.
  • They compute their own knowledge of the network topology.
  • They use hop counts to compute the network topology.
  • They flood the routing table to all hosts periodically.
Explanation:  No answer description available for this question

Q45. Which two factors are important when deciding which interior gateway routing protocol to use? (Choose two.)

  • scalability
  • ISP selection
  • speed of convergence
  • the autonomous system that is used
  • campus backbone architecture
Explanation:  No answer description available for this question

Q46. Refer to the exhibit. How many broadcast and collision domains exist in the topology?

  • 10 broadcast domains and 5 collision domains
  • 5 broadcast domains and 10 collision domains
  • 5 broadcast domains and 11 collision domains
  • 16 broadcast domains and 11 collision domains
Explanation:  No answer description available for this question

Q47. A network contains multiple VLANs spanning multiple switches. What happens when a device in VLAN 20 sends a broadcast Ethernet frame?

  • All devices in all VLANs see the frame.
  • Devices in VLAN 20 and the management VLAN see the frame.
  • Only devices in VLAN 20 see the frame.
  • Only devices that are connected to the local switch see the frame.
Explanation:  VLANs create logical broadcast domains that can span multiple VLAN segments. Ethernet frames that are sent by a device on a specific VLAN can only be seen by other devices in the same VLAN.

Q48. What does the cost of an OSPF link indicate?

  • A higher cost for an OSPF link indicates a faster path to the destination.
  • Link cost indicates a proportion of the accumulated value of the route to the destination.
  • Cost equals bandwidth.
  • A lower cost indicates a better path to the destination than a higher cost does.
Explanation:  No answer description available for this question

Q49. A small-sized company has 30 workstations and 2 servers. The company has been assigned a group of IPv4 addresses 209.165.200.224/29 from its ISP. The two servers must be assigned public IP addresses so they are reachable from the outside world. What technology should the company implement in order to allow all workstations to access services over the Internet simultaneously?

  • DHCP
  • static NAT
  • dynamic NAT
  • port address translation
Explanation:  The company allocated only 6 usable host public addresses. Two public addresses should be assigned to the two servers. Since the four remaining public addresses are not enough for the 30 clients, NAT must be implemented for internal workstations to access the Internet. Therefore, the company should use PAT, also known as NAT with overload. DHCP can be used to dynamically assign internal private IP addresses to the workstations, but cannot provide the NAT service required.

Q50. Which information does a switch use to keep the MAC address table information current?

  • the destination MAC address and the incoming port
  • the destination MAC address and the outgoing port
  • the source and destination MAC addresses and the incoming port
  • the source and destination MAC addresses and the outgoing port
  • the source MAC address and the incoming port
  • the source MAC address and the outgoing port
Explanation:  No answer description available for this question

Q51. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Fill in the blank. Do not use abbreviations.What is the missing command on S1?

  • ip address 192.168.99.2 255.255.255.0
Explanation:  No answer description available for this question