CCNA Practice Exam 5

Topics include NetFlow monitoring commands (ingress/egress), export setup, and switch configurations. Great insight for networking students & IT professionals.

Mason Bennett
Contributor
4.9
51
3 months ago
Preview (12 of 37)
Sign in to access the full document!
Exam Report: E.fl CCNA Certification Practice Exam
ate: 10/23/2017 7 : 1 5 : M pm
Time Spent: 01:30:00 of 01:30:00
Candidate: Pierre, Wansy
Login: wanslypierre
O v e r a l l Performance
Your Score: 85%
Passing Score; S5%
View results by: -.n objective Analysis H Individual Responses
I ndividual Responses
T Q u e s t i o n 1: Correct
You are configuring NetFlow on a router. You want to monitor both incoming and outgoing
traffic on an interface.
You've used the interface command to allow you io configure the interface. What commands
should you use next? (Select two. Both responses are part of the complete solution.)
ip flow-import source < fnterface>
y ip flow ing ress
ip flow-export destination <ao'dress> <porf>
7 ip flow egress
ip flow-export source <mferface>
Explanation
Use the ip flow interface configuration command to enable NetFlow monitoring on a router
interace. Specifying ingress with this command configures NetFlow to monitor incoming
packets on the interface. Specifying egress with this command configures NetFlow to monitor
outgoing packets on the interface.
Use the ip f l o w - e x p o r t d e s t i n a t i o n <3ddness> < p o r t > command to configure the router
to export NetFlow records to the NetFlow Collector configured with the IP address and UDF
port specified. Use the ip f l o w - e x p o r t s o u r c e < i n t e r f a c e > command to specify the interface
on the router to use as the source of the packets sent to the NetFlow connector, “he ip f l o w -
i m p o r t s o u r c e < mierface> command is not a valid NetFlow command.
References
LabSim for Routing and Switching Pro, Section 9.3.
[CCNA_.AliQuestions.exm NETFLOWJB]
Question 2: Correct
* This question includes an image to help you answer the question. View Image
You have three switches configured as shown in the Exhibit.
For each port, identify the port role and status after spanning tree convergence by matching
the port states on the eft with the ports on the graphic. (Port states on the left can be used
n rpore than not at all B G i D ,2 c GjQf1
Altn BLK Root FWD Desg F'AD Desg FWD Desg FWD
C GiDQ
Root FWD
Explanation
In this example:
Switch B is the root bridge because :ts MAC address is the lowest. This means that GKL'1
and GiD/2 are both designated ports (Desg) and are forward ng (FWD).
- Pod Gi0i2 on switch A and GiD/2 on switch C are root ports. Root ports are forwarding.
- For the segment between switch A anc C, GiE/1 on switch C is the designated port. This is
because the MAC address for switch C is tower than the MAC add 'ess far switch A.
GiO.'T on switch A is an alternate port (Attn) and is blockirg (BLK). There is only one
designated port per segment, with all other ports being im a blocking slate.
Root ports are in the forwarding (FWD) state, not in backing (BLK) state.
References
LabSim for Routing anc Switching Pro, Section 11.3.
[CCNA AJQuestons.exm STP_COMCEPTS_01]
Q u e s t i o n 3: Correct
You have decided to use ACLs on your router to restrict TFTP traffic between networks.
Specifically, you want to allow only the server with an IP address of 172. 17.3.1 to access an
TFTP server on a different network with an IP address of 10.0.3.1. The TFTP protocol runs on
DP port 60. To accomplish this, you create the following ACL on the router connecting the
two networks:
Routerfccmf gX access-list 100
RoutericonfigX access-list 10D permit udp 172. 17.3.1 C.0.0.255 host 10.C.C-. 1 eq 65
Routericonf gX access-list 103 deny udp any any eq 65
Rcuter(configX access-list 100 permit IP any any
After applying the ACL to inbound traffic on the interface connected to the 172.1 7.8.0/24
network, you find that all hosts on the 172.17.3.0/24 network can still access the TFTP service
on 1D.D.3.1 over port 65.
Which of the following options can be used to fix this issue? (Select two.)
Ada ar aaditioral ACL line of access-list 100 deny I P any any.
Remove the ACL Ifoetbst reads a c c e s s - l i s t 100 deny udp any any eq 69.
■■ / . Modify the first ACL line t o a c c e s s - l i s t 100 permit udp 1 72.17.8.1 0.0. 0.0 host
1 0 . 0 . 0 . 1 eq 69.
J Modify the first ACL ine tc a c c e s s - l i s t 100 permit udp host 172.17.8.1 host
1 0 . 0 . 0 . 1 eq 69.
Modify the f rst ACL line t o a c c e s s - l i s t 100 permit udp 1 72.1 7.8.1 0.0.255.255
host 10.0.0.1 eq 69.
Explanation
This ssue is being caused by the ACL lire that reads access-list 100 p e r m i t udp
1 7 2 . 1 7 . 8 . 1 0 . 0 . 0 . 2 5 5 h o s t l O . 0.0.1 eq 69. The 0.0.0.255 mast causes this lire io be
matched by any source host whose IP adcress begins with 172.17.8, which would include sll
hosts on the 172.17.8.0/24 subnet. Ether of the following resolutions will fix this issue:
Mocify the first ACL line tc access-list 100 p e r m i t udp 1 7 2 . 1 7 . 8 . 1 D.0.D.0 h o s t
1 0 . 0 . 0 . 1 eq 69. This matches only the source host with an IP address of 172.17.8.1.
Modify the f rst ACL line to access-list 100 p e r m i t udp h o s t 172.17.8.1 h o s t 1 0.0. 0.1
eq 69. This also matches only the source host with an IP address of 172.17.8.1.
Modifying the first ACL line to access-list 1 00 permit udp 172.17.8.1 0.0.255.255 host
10. 0.0.1 eq 69 would broacen the number of matches by allowing any source host whose IP
acd ress begins with 172.17, which violates the conditions of the scenario. Removing the ACL
line that reads a c c e s s - l i s t 100 deny udp any any eq 69 would allow all TFTP t-afnc through
by any host that doesn't match the f rst line. Adding an additional ACL line of access-list 100
deny I P any any would duplicate tne effect of the implicit deny and isn't necessary.
References
LabSim for Routing and Switcning Pro, Section 8.4.
[CCNA_ATQuestions.exm ACL_TRB_03]
Question 4: Cor rect
Your client has acquired several small companies ard would like to connect them together into
one network Not all the routers are Cisco devices and compatibility is a concern. Which WAN
encapsulation method should you recommend ycur client use?
PPP
Ethernet
PAP
Cisco HDLC
Explanation
The Point-to-Point (PPP} protocol is not proprietary. For this reason, it is the best choice for
connecting dissimilar vendor devices.
Cisco HDLC is the default serial encapsulation method, but is only supported on Cisco devices.
PAP ts a PPP authentication protocol. Ethernet is not a WAN protocol.
References
LabSim for Routing and Switcning Pro, Section 13.3.
|CCNA_ADQuesbDns.exm PPP_03]
Question 5: Correct
This question induces an image to help you answer the question. View Image
You have a small business network with a single subnet connected to the Internet through a
Cisco router (RouterA). IP addresses have been assigned as shown in tne Exhibit
A browser session on the workstation tries to connect to the www.westsim.com weo server

Loading page 6...

Loading page 7...

Loading page 8...

Loading page 9...

Loading page 10...

Loading page 11...

Loading page 12...

9 more pages available. Scroll down to load them.

Preview Mode

Sign in to access the full document!

100%

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all