Professional Documents
Culture Documents
Result of Composite Quiz 102 Questions
Result of Composite Quiz 102 Questions
Total Questions Full Score Passing Rate Your Score Correct Answer Percentage Elapsed
102 1585 80% 675 42.59% 00:48:31
Sorry!
If you want to retake this quiz, please press Ctrl + F5 on Windows or press CMD + R on Mac.
Question 1
Explanation
A working interface (in an up/up state) can still suffer from issues related to the physical cabling as well. The cabling problems might not be bad enough to cause a
complete failure, but the transmission failures result in some frames failing to pass successfully over the cable. For example, excessive interference on the cable
can cause the various input error counters to keep growing larger, especially the CRC counter. In particular, if the CRC errors grow, but the collisions counters do
not, the problem might simply be interference on the cable. (The switch counts each collided frame as one form of input error as well.)
In this question, only the input errors and CRC errors grow -> "The cable connected between two devices is faulty" is the best choice.
Note: One problem, called late collisions, points to the classic duplex mismatch problem. But there is no late collision errors so duplex mismatch is not an in this
question.
Question 2
https://www.9tut.com/composite-quiz 1/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
What is a characteristic of an SSID in wireless networks?
A. converts electrical current to radio waves
B. broadcasts a beacon signal to announce its presence by default
C. prompts a user for a login ID
D. uses policies to prevent unauthorized users
Question 3
Refer to the exhibit. Refer to the exhibit. After the configuration is applied, the two routers fail to establish an OSPF neighbor relationship. what is the
reason for the problem?
Router2(config)#interface GigabitEthernet1/1
Router1(config)#interface GigabitEthernet1/1
Router2(config-if)#description ***Connection to Router1***
Router1(config-if)#description ***Connection to Router2***
Router2(config-if)#ip address 10.10.10.2 255.255.255.252
Router1(config-if)#ip address 10.10.10.1 255.255.255.252
Router2(config)#router ospf 1001
Router1(config-if)#ip ospf hello-interval 5
Router2(config-router)#router-id 2.2.2.2
Router1(config)#router ospf 1000
Router2(config-router)#network 10.10.10.0 0.0.0.3 area 0
Router1(config-router)#router-id 1.1.1.1
Router2(config-router)#passive-interface default
Router1(config-router)#network 10.10.10.0 0.0.0.3 area 0
Router2(config-router)#no passive-interface GigabitEthernet1/1
Question 4
Drag and drop the IPv6 address descriptions from the left onto the IPv6 address types on the right. Not all options are used.
Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 13625 (which means
136 for first group, 25 for second group).
Explanation
Answer:
Link-Local Addresses
+ serve as next-hop addresses
+ unable to serve as destination addresses
Explanation
Unique local address (or Site-local address) are analogous to IPv4’s private address classes. They start with FC00::/7 (for used in private networks) -> The first
octet can be FC or FD. However when you implement this you have to set the L-bit (the right-most bit of the first octet) to 1 which means that the first two digits
will be FD.
FF02::5 is a multicast address (not a link-local address). It only has a link-local scope (an IPv6 router never forwards this type of traffic beyond the local link) so
this IPv6 address does not belong to “link-local addresses”.
You can use either Global Unicast IPv6 address or Link-Local IPv6 address as the next hop address. However, if you provide the Link-Local IPv6 address as the
next hop address, you need to provide the interface number also.
https://www.9tut.com/composite-quiz 2/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Refefence: https://www.omnisecu.com/cisco-certified-network-associate-ccna/how-to-configure-ipv6-static-routes-in-cisco-routers.php
Question 5
Drag and drop the cloud-computing components from the left onto the correct descriptions on the right.
Note: You just need to click on one of the boxes on the right to match it with the corresponding box on the left.
Explanation
Answer:
+ The resource pool can expand quickly to meet demand: rapid elasticity
+ The consumer can choose when to start or stop using the service: on-demand self-service
+ The provider allocates CPU, memory, and disk from its shared compute resources to multiple customers: resource pooling
+ The provider can bill the consumer in accordance with the level of usage: measured service
+ The service is available from many types of devices and networks: broad network access
On-demand self-service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without
requiring human interaction with each service provider.
Broad network access: Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick
client platforms (e.g., mobile phones, tablets, laptops, and workstations).
Resource pooling: The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual
resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no
control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or
datacenter). Examples of resources include storage, processing, memory, and network bandwidth.
Rapid elasticity: Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with
demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time.
Measured service: Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to
the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing
transparency for both the provider and consumer of the utilized service.
Reference: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
Question 6
A. Each leaf switch is connected to a central leaf switch, then uplinked to a core spine switch.
B. Each leaf switch is connected to each spine switch.
C. Each leaf switch is connected to two spine switches, making a loop.
D. Each leaf switch is connected to one of the spine switches.
Explanation
With Leaf-Spine, the network uses Layer 3 routing so STP is no longer required. Spine-leaf architectures rely on protocols such as Equal-Cost Multipath (ECPM)
routing to load balance traffic across all available paths while still preventing network loops. This allows all connections to be utilized at the same time while still
remaining stable and avoiding loops within the network.
-> Answer "Each leaf switch is connected to two spine switches, making a loop" is not correct because spine-and-leaf topology does not "make a loop" because it
does not run STP, it runs ECPM.
https://www.9tut.com/composite-quiz 3/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Every leaf switch connects to every spine switch in the fabric. The path is randomly chosen so that the traffic load is evenly distributed among the top-tier switches.
Reference: https://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/white-paper-c11-737022.html
Question 7
An engineer must configure the interface that connects to PC1 and secure it in a way that only PC1 is allowed to use the port. No VLAN tagging can be
used except for a voice VLAN. Which command sequence must be entered to configure the switch?
Question 8
Explanation
Use the ip address dhcp command to obtain IP address information for the configured interface.
Question 9
Explanation
The purpose of Port Fast is to minimize the time interfaces must wait for spanning-tree to converge, it is effective only when used on interfaces connected to end
stations.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_55_se/configuration/guide/3560_scg/swstpopt.html
Question 10
https://www.9tut.com/composite-quiz 4/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Explanation
Pure IPSec configuration (no GRE tunnel) does not support multicast or broadcast traffic. Spanning-tree updates use multicast too. -> Answer 'broadcast packets
from a switch that is attempting to locate a MAC address at one of several remote sites' , answer 'multicast traffic from a server at one site to hosts at another
location' and answer 'spanning-tree updates between switches that are at two different sites' are not correct.
Question 11
Drag the characteristics of network architectures from the left onto the type of architecture on the right.
Note: Please type the corresponding numbers of each item on the left to the blank below and arrange them ascendingly. For example: 13524 (which means
135 for first group, 24 for second group).
Please type your answer here: 12452 (correct answer: 12435)
Explanation
The three-tier hierarchical design maximizes performance, network availability, and the ability to scale the network design.
However, many small enterprise networks do not grow significantly larger over time. Therefore, a two-tier hierarchical design where the core and distribution
layers are collapsed into one layer is often more practical. A “collapsed core” is when the distribution layer and core layer functions are implemented by a
single device. The primary motivation for the collapsed core design is reducing network cost, while maintaining most of the benefits of the three-tier hierarchical
model.
Reference: https://www.ciscopress.com/articles/article.asp?p=2202410&seqNum=4
A collapsed core network is shown below. The collapsed core network may be deployed with redundant core/distribution router, or consolidated core/distribution
router.
Question 12
Comments (17)
https://www.9tut.com/composite-quiz 5/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Question 13
What are two improvements provided by automation for network management in an SDN environment? (Choose two)
Question 14
A. 00-07-C0-70-AB-01
B. 00-00-5E-00-01-0a
C. 00-C6-41-93-90-91
D. 00-00-0C-07-AD-89
Explanation
With VRRP, the virtual router’s MAC address is 0000.5E00.01xx , in which xx is the VRRP group.
Note: We are not sure why there is a VRRP question here as it is not in the syllabus of the exam.
Question 15
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13
for first group, 24 for second group).
Explanation
Answer:
Multicast
+ sends packets to a group address rather than a single address
+ has a unicast source sent to a group
Anycast
+ is used exclusively by a non-host device
+ is routed to the nearest interface that has the address
Explanation
An anycast address is an address that is assigned to a set of interfaces that typically belong to different nodes. A packet sent to an anycast address is delivered to the
closest interface (as defined by the routing protocols in use) identified by the anycast address.
Anycast addresses can be used only by a device, not a host, and anycast addresses must not be used as the source address of an IPv6 packet.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6_basic/configuration/xe-3se/5700/ip6-anycast-add-xe.html
Question 16
https://www.9tut.com/composite-quiz 6/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Question 17
Which two practices are recommended for an acceptable security posture in a network? (Choose two)
Question 18
Router R1 currently is configured to use R3 as the primary route to the Internet, and the route uses the default administrative distance settings. A
network engineer must configure R1 so that it uses R2 as a backup, but only if R3 goes down. Which command must the engineer configure on R1 so that
it correctly uses R2 as a backup route, without changing the administrative distance configuration on the link to R3?
Explanation
R1 uses R3 as the primary route to the Internet so it may use either of these commands:
The administrative distance (AD) of the first command is 1 while that of the second command is 0. Therefore we have to choose a higher AD for our backup route.
And the exit interface of the backup route is g0/1 or the next-hop is 209.165.200.230.
Question 19
https://www.9tut.com/composite-quiz 7/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
A network engineer configures the Cisco WLC to authenticate local wireless clients against a RADIUS server. Which task must be performed to complete
the process?
A. Enable the Management option
B. Enable the Support for CoA option
C. Disable the Server Status option
D. Enable the Network User option
Explanation
If you are configuring a RADIUS authentication server, check the Management check box to enable management authentication (authenticate users who login to
the the WLC). If you enable this feature, this entry is considered the RADIUS authentication server for management users, and authentication requests go to the
RADIUS server.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/config-guide/b_cg85/aaa_administration.html
The Network User check box to enable network user authentication. So the best answer here should be enable "Network User" as it also authenticates local users.
Note:
+ Support for CoA (change of authorization) is an extension to the RADIUS protocol that allows dynamic changes to a user session.
+ The Server Status checkbox is used to enable/disable this RADIUS server.
Question 20
Which two statements about the purpose of the OSI model are accurate? (Choose two)
Question 21
https://www.9tut.com/composite-quiz 8/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
The given Windows PC is requesting the IP address of the host at www.cisco.com. To which IP address is the request sent?
A. 192.168.1.254
B. 192.168.1.253
C. 192.168.1.226
D. 192.168.1.100
Explanation
In this question, the Windows PC is trying to resolve the domain name www.cisco.com to an IP address so it will need a DNS server.
From the output we see the line "DNS Servers ...: 192.168.1.253" so this is the IP address the request is sent. Notice that the "Default Gateway" IP address is in the
same subnet of DNS Server so the PC can directly send request to the DNS Server.
Question 22
Drag the descriptions of device management from the left onto the types of device management on the right.
Note: Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 136245 (which
means 136 for first group, 245 for second group).
Please type your answer here: 124 (correct answer: 356124)
Explanation
Unlike SDN, traditional networking has two main characteristics. First, traditional networking functions are mainly implemented in dedicated devices. In this case,
“dedicated devices” refer to one or more switches (e.g. 10gb switch), routers, and application delivery controllers. Second, most of the functionality in traditional
networking devices is implemented in dedicated hardware. ASIC (Application Specific Integrated Circuit) is commonly used for this purpose. However, this
traditional hardware-centric networking is accompanied by many limitations.
Reference: https://www.chinacablesbuy.com/sdn-vs-traditional-networking-which-leads-the-way.html
https://www.9tut.com/composite-quiz 9/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
The Inventory function retrieves and saves details, such as host IP addresses, MAC addresses, and network attachment points about devices in its database.
The Inventory feature can also work with the Device Controllability feature to configure the required network settings on devices, if these settings are not already
present on the device.
After the initial discovery, Cisco DNA Center maintains the inventory by polling the devices at regular intervals.
Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-center/2-1-
2/user_guide/b_cisco_dna_center_ug_2_1_2/b_cisco_dna_center_ug_2_1_1_chapter_011.html
Question 23
Drag and drop the characteristic from the left onto the cable type on the right.
Please type the corresponding numbers of each item on the left to the
blank below and sort them in ascending order. For example: 1324 (which means 13 for first group, 24 for second group).
Please type your answer here: 1324 (correct answer: 2413)
Question 24
R2
interface GigabitEthernet0/1
ip address 192.168.12.2 255.255.255.128
no shutdown
A network engineer started to configure two directly-connected routers as shown. Which command sequence must the engineer configure on R2 so that
the two routers become OSPF neighbors?
A. interface GigabitEthernet0/1
ip ospf 1 area 1
B. interface GigabitEthernet0/1
ip ospf 1 area 0
C. router ospf 1
network 192.168.12.0 0.0.0.127 area 0
D. router ospf 1
network 192.168.12.1 0.0.0.0 area 1
Explanation
To establish OSPF neighbor between R1 & R2, interface Gi0/1 of R2 must belong to the same area of interface Gi0/1 of R1 (area 1) and OSPF must be turned on
on this interface via “ip ospf 1 area 1” command or “network 192.168.12.2 0.0.0.0 area 1″ command or “network 192.168.12.0 0.0.0.127 area 1” command…
Question 25
Drag and drop the Ansible terms from the left onto the right.
Note: You just need to click on one of the boxes on the right to match it with the corresponding box on the left.
collection of actions to perform on target devices, expressed in YAML format managed node
device with Ansible installed that manages target devices control node
network device, without Ansible installed, upon which commands can be executed playbook
specific action to be performed on one or more target devices task
unit of Python code to be executed module
Ansible file that defines the target devices upon which commands and tasks can be executed inventory
Explanation
https://www.9tut.com/composite-quiz 10/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
+ Playbooks: These files provide actions and logic about what Ansible should do. Ansible playbooks are files that contain tasks to configure hosts. Ansible
playbooks are written in YAML format.
+ Inventory: a file contains a list of the hosts (usually their IP addresses, ports) which you want to configure or manage. Hosts in an inventory can be divided into
smaller groups for easier management and configuration. Each group can run different tasks. An example of a task is to ping all hosts in group [routers].
…
Modules (also referred to as “task plugins” or “library plugins”) are discrete units of code that can be used from the command line or in a playbook task. Ansible
executes each module, usually on the remote managed node, and collects return values.
The control node is a computer that runs Ansible. A managed node is any device being managed by the control node.
Reference: https://opensource.com/resources/what-ansible
Question 26
Refer to exhibit. How does SW2 interact with other switches in this VTP domain?
SW2
vtp domain cisco
vtp mode transparent
vtp password test
interface fastethernet0/1
description connection to SW1
switchport mode trunk
switchport trunk encapsulation dot1q
A. It forwards only the VTP advertisements that it receives on its trunk ports
B. It transmits and processes VTP updates from any VTP Clients on the network on its trunk ports
C. It processes VTP updates from any VTP clients on the network on its access ports
D. It receives updates from all VTP servers and forwards all locally configured VLANs out all trunk ports
Explanation
The VTP mode of SW2 is transparent so it only forwards the VTP updates it receives to its trunk links without processing them.
Question 27
Which two server types support domain name to IP address resolution? (Choose two)
A. resolver
B. file transfer
C. ESX host
D. authoritative
E. web
Explanation
All DNS servers fall into one of four categories: Recursive resolvers, root nameservers, TLD nameservers, and authoritative nameservers.
Question 28
https://www.9tut.com/composite-quiz 11/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Host A switch interface is configured in VLAN 2. Host D sends a unicast packet destined for the IP address of host A.
Sw1#show mac-address table
Mac Address Table
-----------------------------
Vlan Mac Address Type Ports
---- ----------- ------- ----
2 000c.859c.bb7b DYNAMIC e0/1
3 000c.85dc.bb7b DYNAMIC e0/1
2 0010.11dc.3e91 DYNAMIC e0/2
3 0010.11dC.3e91 DYNAMIC e0/2
2 0044.42d9.c693 DYNAMIC e0/3
Sw1#
What does the switch do when it receives the frame from host D?
A. It creates a broadcast storm.
B. It drops the frame from the MAC table of the switch.
C. It floods the frame out of every port except the source port.
D. It shuts down the source port and places It in err-disable mode.
Explanation
HostA MAC address and port have not been learned in the switch MAC address table so the switch will flood the frame out of all ports except the source port
where it received the frame.
Question 29
An engineer needs to configure LLDP to send the port description time length value (TLV). What command sequence must be implemented?
A. switch(config-line)#lldp port-description
B. switch(config)#lldp port-description
C. switch(config-if)#lldp port-description
D. switch#lldp port-description
Explanation
Use the switch(config)#lldp port-description option to specify the port description TLV messages.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus6000/sw/layer2/7x/b_6k_Layer2_Config_7x/config_lldp.pdf
Question 30
What does an SDN controller use as a communication protocol to relay forwarding changes to a southbound API?
A. Java
B. REST
C. OpenFlow
D. XML
Explanation
OpenFlow and NETCONF are Southbound APIs used for most SDN implementations.
Note: SDN northbound APIs are usually RESTful APIs used to communicate between the SDN Controller and the services and applications running over the
network.
Question 31
https://www.9tut.com/composite-quiz 12/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
A new VLAN and switch are added to the network. A remote engineer configures OldSwitch and must ensure that the configuration meets these
requirements:
* accommodates current configured VLANs
* expands the range to include VLAN 20
* allows for IEEE standard support for virtual LANs
Which configuration on the NewSwitch side of the link meets these requirements?
A. switchport mode dynamic
channel-group 1 mode active
switchport trunk allowed vlan 5,10,15,20
B. switchport nonnegotiate
no switchport trunk allowed vlan 5,10
switchport trunk allowed vlan 5,10,15,20
C. no switchport mode trunk
switchport trunk encapsulation isl
switchport mode access vlan 20
D. no switchport trunk encapsulation isl
switchport trunk encapsulation dot1q
switchport trunk allowed vlan add 20
Question 32
Which route type does the routing protocol Code D represent in the output?
Explanation
Code “D” represents for EIGRP. Code “E” could not be used for EIGRP as it was used for Exterior Gateway Protocol (EGP), which is BGP predecessor.
Question 33
Which step in the link-state routing process is described by a router sending Hello packets out all of the OSPF-enabled interfaces?
Question 34
A. G0/20
B. G0/16
C. G0/11
D. G0/9
Explanation
The first entry has lowest AD (110) and lowest metric (9443) so it is the best route and will be installed into the routing table.
Question 35
What criteria is used first during the root port selection process?
Question 36
Drag and drop the DNS commands from the left onto their effects on the right.
Note: You just need to click on one of the boxes on the right to match it with the corresponding box on the left.
Explanation
Answer:
Question 37
Explanation
Cisco Physical Access Control is a comprehensive IP-based solution that uses the IP network as a platform for integrated security operations.
Question 38
https://www.9tut.com/composite-quiz 14/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
A Cisco engineer creates a new WLAN called lantest. Which two actions must be performed so that only high-speed 2.4-Ghz clients connect? (Choose two)
A. Set the Interface/Interface Group(G) to an interface other than guest.
B. Set the Radio Policy option to 802.11g only.
C. Enable the Broadcast SSID option.
D. Enable the Status option.
E. Set the Radio Policy option to 802.11a only.
Explanation
First we need to enable this WLAN -> Answer 'Enable the Status option' is correct.
+ 802.11a: Operates in the 5 GHz band only and supports a maximum data rate of 54 Mbps -> Answer 'Set the Radio Policy option to 802.11a only' is not correct.
+ 802.11g: Operates in the 2.4 GHz band only and supports a maximum data rate of 54 Mbps
Question 39
Refer to the exhibit. An extended ACL has been configured and applied to router R2. The configuration failed to work as intended. Which two changes
stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two)
R2#config t
R2(config)#access-list 101 deny tcp 10.0.20.0 0.0.0.63 10.0.10.0 0.0.0.63 eq smtp
R2(config)#access-list 101 deny tcp 10.0.20.0 0.0.0.63 10.0.10.0 0.0.0.63 eq www
R2(config)#int gi0/2
R2(config-if)#ip access-group 101 in
A. The ACL must be moved to the Gi0/1 interface outbound on R2
B. Add a “permit ip any any” statement to the beginning of ACL 101 for allowed traffic
C. Add a “permit ip any any” statement at the end of ACL 101 for allowed traffic
D. The ACL must be configured the Gi0/2 interface inbound on R1
E. The source and destination IPs must be swapped in ACL 101
Question 40
Which two components are needed to create an Ansible script that configures a VLAN on a switch? (Choose two)
A. recipe
B. playbook
C. task
https://www.9tut.com/composite-quiz 15/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
D. model
E. cookbook
Question 41
A network administrator must permit traffic from the 10.10.0.0/24 subnet to the WAN on interface Serial0. What is the effect of the configuration as the
administrator applies the command?
Explanation
The last command is not correct. We must use the “ip access-group 10 in” command to apply this ACL to the interface.
Question 42
Question 43
Total doors: 0
Appl doors: 0
Normal doors: 0
Queued Packets: 0
What is the next step to complete the implementation for the partial NAT configuration shown?
Explanation
We see the line “Outside interfaces: ” is still empty which means we have not configured an outside interface yet.
Question 44
https://www.9tut.com/composite-quiz 16/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Switch1: 0C.E0.38.57.24.22
Switch2: 0C.0E.15.22.1A.61
Switch3: 0C.0E.15.1D.3C.9A
Switch4: 0C.E0.19.A1.4D.16
After the election process what is the root bridge in the HQ LAN?
A. Switch 4
B. Switch 2
C. Switch 1
D. Switch 3
Question 45
Which command configures the Cisco WLC to prevent a serial session with the WLC CLI from being automatically logged out?
Explanation
The CLI automatically logs you out without saving any changes after 5 minutes of inactivity. You can set the automatic logout from 0 (never log out) to 160
minutes using the config serial timeout command.
To prevent SSH or Telnet sessions from timing out, run the config sessions timeout 0 command.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configuration-guide/b_cg80/b_cg80_chapter_011.html
This question asks about the serial session so the first command is the correct answer.
Question 46
Which plan must be implemented to ensure optimal QoS marking practices on this network?
A. Trust the IP phone markings on SW1 and mark traffic entering SW2 at SW2
B. Remark traffic as it traverses R1 and trust all markings at the access layer
C. As traffic traverses MLS1 remark the traffic, but trust all markings at the access layer
D. As traffic enters from the access layer on SW1 and SW2, trust all traffic markings
Explanation
https://www.9tut.com/composite-quiz 17/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
“Classify, mark, and police as close to the traffic-sources as possible.” -> Answer 'As traffic traverses MLS1 remark the traffic, but trust all markings at the access
layer ' is not correct.
Reference: https://www.cisco.com/en/US/technologies/tk543/tk759/technologies_white_paper0900aecd80295aa1.pdf
As a rule, it is not recommended to trust markings set by end users leveraging PCs or other endpoint devices. End users can intentionally or unintentionally abuse
QoS policies that trust markings of end devices. If users and unclassified applications take advantage of the configured QoS policy as a result of trusting end
devices, this can result in easily starving priority queues with nonpriority traffic, ruining quality of service for real-time applications.
Reference: https://www.ciscopress.com/articles/article.asp?p=2756478&seqNum=2
-> Answer 'As traffic enters from the access layer on SW1 and SW2, trust all traffic markings ' and answer 'Remark traffic as it traverses R1 and trust all markings
at the access layer' are not correct.
Question 47
Question 48
A network administrator must enable DHCP services between two sites. What must be configured for the router to pass DHCPDISCOVER messages on
to the server?
A. DHCP Snooping
B. a DHCP Pool
C. DHCP Binding
D. a DHCP Relay Agent
Explanation
If the DHCP Server is not on the same subnet with the DHCP Client, we need to configure the router on the DHCP client side to act as a DHCP Relay Agent so that
it can forward DHCP messages between the DHCP Client & DHCP Server. To make a router a DHCP Relay Agent, simply put the “ip helper-address <IP-address-
of-DHCP-Server>” command under the interface that receives the DHCP messages from the DHCP Client.
As we know, router does not forward broadcast packets (it drops them instead) so DHCP messages like DHCPDISCOVER message will be dropped. But with the
“ip helper-address …” command, the router will accept that broadcast message and cover it into a unicast packet and forward it to the DHCP Server. The
destination IP address of the unicast packet is taken from the “ip helper-address …” command.
Question 49
https://www.9tut.com/composite-quiz 18/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
A network engineer must migrate a router loopback interface to the IPv6 address space. If the current IPv4 address of the interface is 10.54.73.1/32, and
the engineer configures IPv6 address 0:0:0:0:0:ffff:a36:4901, which prefix length must be used?
A. /128
B. /124
C. /64
D. /96
Explanation
The format for IPv4 Mapped address has the first 80 bits set to zeros, followed by the next 16 bits set to all ones and finally, the last 32 bits written in dotted
decimal appended to then end forming 128 bit IPv6 address.
An example of an IPv4 Class A address of 12.155.166.101 would look like this in IPv4 Mapped address 0000:0000:0000:0000:0000:FFFF:12.155.166.101 or
::FFFF:12.155.166.101 in IPv6’s short form.
But in this question we are migrate a /32 IP address to IPv6 so the IPv6 address should be /128.
Question 50
A. exclusively sends multicast traffic between servers that are directly connected to the spine
B. mitigates oversubscription by adding a layer of leaf switches
C. offers predictable latency of the traffic path between end devices
D. limits payload size of traffic within the leaf layer
Explanation
A spine-leaf architecture aids this by ensuring traffic is always the same number of hops from its next destination, so latency is lower and predictable.
Reference: https://www.arubanetworks.com/faq/what-is-spine-leaf-architecture/
Question 51
Drag each route source from the left to the numbers on the right. Beginning with the lowest and ending with the highest administrative distance.
1 EBGP
2
3 OSPF
4 EIGRP
5 static
6 connected
Explanation
1: connected (AD = 0)
2: static (AD = 1)
3: EBGP (AD = 20)
4: EIGRP (AD = 90)
5 :OSPF (AD = 110)
6: RIP (AD = 120)
Answer:
1: connected
2: static
3: EBGP
4: EIGRP
5 :OSPF
6: RIP
Question 52
Refer to Exhibit.
https://www.9tut.com/composite-quiz 19/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
An engineer is building a new Layer 2 LACP EtherChannel between SW1 and SW2. and they executed the given show commands to verify the work.
Which additional task must be performed so that the switches successfully bundle the second member in the LACP port-channel?
A. Configure the switchport trunk allowed vlan 300 command on SW1 port-channel 1
B. Configure the switchport trunk allowed vlan add 300 command on interface Fa0/2 on SW2.
C. Configure the switchport trunk allowed vlan add 300 command on SW1 port-channel 1
D. Configure the switchport trunk allowed vlan 300 command on interface Fa0/2 on SW1.
Explanation
All of the member interfaces of an Etherchannel port must have the same configuration or the Etherchannel interface would not be formed. Therefore we must add
VLAN 300 to the interface Fa0/2 on SW1 to match the configuration on interface Fa0/1 by the command "switchport trunk allowed vlan add 300" on interface
Fa0/2 of SW1. But this command does not exist in the four choices so the best alternative command should be answer "Configure the switchport trunk allowed
vlan add 300 command on SW1 port-channel 1". After using this command, two physical interfaces will have the same configuration.
Question 53
Which characteristic differentiates the concept of authentication from authorization and accounting?
A. consumption-based billing
B. service limitations
C. user-activity logging
D. identity verification
Question 54
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which two standard designs are recommended? (Choose two)
Explanation
The 802.11 standard defines 23 20MHz wide channels in the 5 GHz spectrum. Each channel is spaced 20MHz apart and separated into three Unlicensed National
Information Infrastructure (UNII) bands.
Reference: https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Channel_Planning_Best_Practices
Question 55
An engineer must configure traffic for a VLAN that is untagged by the switch as it crosses a trunk link. Which command should be used?
Question 56
https://www.9tut.com/composite-quiz 20/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
How does STP prevent forwarding loops at OSI Layer 2?
A. Port blocking
B. MAC address forwarding
C. Collision avoidance.
D. TTL
Question 57
An engineer is configuring an encrypted password for the enable command on a router where the local user database has already been configured. Drag
and drop the configuration commands from the left into the correct sequence on the right. Not all commands are used.
Please type the corresponding numbers of each item on the left to the blank below. For example: 1362 (which means 1 for "first", 3 for "second", 6 for
"third" and 2 for "fourth").
Please type your answer here: 42365 (correct answer: 4231)
Question 58
Which protocol does an IPv4 host use to obtain a dynamically assigned IP address?
A. DHCP
B. CDP
C. DNS
D. ARP
Question 59
Drag and drop the wireless architecture benefits from the left onto the architecture types on the right.
Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 136245 (which means
136 for first group, 245 for second group).
Please type your answer here: 145 (correct answer: 23514)
Explanation
An autonomous AP is a self-contained device with both wired and wireless hardware so that it can bridge to the wired VLAN infrastructure wireless clients that
belong to SSIDs. Each autonomous AP must be configured with a management IP address so that it can be remotely accessed using Telnet, SSH, or a web interface.
Each AP must be individually managed and maintained unless you use a management platform such as Cisco DNA Center.
The division of labor between the WLC and LAPs is known as split-MAC architecture. The LAP must interact with wireless clients on some low level, known as
the Media Access Control (MAC) layer. These functions must stay with the LAP hardware, closest to the clients. The management functions are not integral to
handling frames but are things that should be centrally administered. Therefore, those functions can be moved to a centrally located platform away from the AP.
Reference: https://www.ciscopress.com/articles/article.asp?p=2999384&seqNum=5
https://www.9tut.com/composite-quiz 21/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Question 60
Explanation
When you enable LAG or make any changes to the LAG configuration, you must immediately reboot the controller.
Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-
4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_010100001.html
Question 61
Which advantage does the network assurance capability of Cisco DNA Center provide over traditional campus management?
A. Cisco DNA Center automatically compares security postures among network devices, and traditional campus management needs manual comparisons
B. Cisco DNA Center correlates information from different management protocols to obtain insights, and traditional campus management
requires manual analysis
C. Cisco DNA Center leverages YANG and NETCONF to assess the status of fabric and nonfabric devices, and traditional campus management uses CLI
exclusively
D. Cisco DNA Center handles management tasks at the controller to reduce the load on infrastructure devices, and traditional campus management uses the
data backbone.
Explanation
DNA Center uses many management protocols to provide a single pane of glass for all devices.
Question 62
Which component controls and distributes physical resources for each virtual machine?
A. physical enclosure
B. hypervisor
C. OS
D. CPU
Explanation
The hypervisor abstracts and isolates the VMs and their programs from the underlying server hardware, enabling a more efficient use of physical resources, simpler
maintenance and operations, and reduced costs.
Reference: https://www.nutanix.com/info/hypervisor
Question 63
Explanation
If the source MAC address does not exist, the switch adds the source MAC address to the MAC address table along with the incoming port number.
Question 64
A network administrator is configuring a router for user access via SSH. The service-password encryption command has been issued. The configuration
must meet these requirements:
https://www.9tut.com/composite-quiz 22/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
– Create the username as CCUser.
– Create the password as NA!2$cc.
– Encrypt the user password.
Explanation
In fact all other answers look good too, but answer 'username CCUser secret NA!2$cc' is the best choice as the password of the username is encrypted with highest
security level.
Question 65
Question 66
When a floating static route is configured, which action ensures that the backup route is used when the primary route falls?
A. The floating static route must have a higher administrative distance than the primary route so it is used as a backup
B. The default-information originate command must be configured for the route to be installed into the routing table
C. The floating static route must have a lower administrative distance than the primary route so it is used as a backup
D. The administrative distance must be higher on the primary route so that the backup route becomes secondary
Question 67
A switch is forwarding a frame out of all interfaces except the interface that received the frame. What is the technical term for this process?
A. multicast
B. ARP
C. CDP
D. flooding
Question 68
Drag and drop the facts about wireless architectures from the left onto the types of access point on the right. Not all options are used.
Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13
for first group, 24 for second group).
Explanation
Answer:
https://www.9tut.com/composite-quiz 23/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Lightweight Access Point
+ configured and managed by a WLC
+ supports different operational modes
Question 69
According to the output, which parameter set is validated using the routing table of R7?
Explanation
Traffic destined to 10.90.8.0/24 matches the output line "10.90.0.0/16 [200/0] via 0.0.0.0, 03:57:59, Null0" so it will be forwarded to Null0 interface, which means
it will be dropped.
From "D EX" letter, we learn that R7 is receiving routes that were redistributed in EIGRP (another routing protocol was redistributed into EIGRP).
Question 70
What software defined architecture plane assists network devices with making packet forwarding decisions by providing Layer 2 reachability and Layer
3 routing information?
A. control plane
B. management plane
C. data plane
D. policy plane
Explanation
+ Distributed – Conventional routers and switches operate using distributed protocols for control, i.e. where each device makes its own decisions about what to do,
and communicate relevant information to other devices for input into their decision making process. For example, the Spanning Tree Protocol (STP), Fabric Path,
and routing protocols such as IS-IS and BGP provide distributed control of packet forwarding functionality to networking devices.
+ Centralized – In this case, a centralized controller provides the necessary information for a network element to make a decision. For example, these controller(s)
instruct networking devices on where to forward packets by explicitly programming their MAC and FIBs.
Reference: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/VMDC/SDN/SDN.html
Question 71
https://www.9tut.com/composite-quiz 24/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
D. displaying OSPF neighbor information on a per-interface basis
Question 72
An engineer is configuring a new router on the network and applied this configuration. Which additional configuration allows the PC to obtain its IP
address from a DHCP server?
Question 73
After applying this configuration to router R1, a network engineer is verifying the implementation. If all links are operating normally, and the engineer
sends a series of packets from PC1 to PC3, how are the packets routed?
A. They are distributed sent round robin to interfaces S0/0/0 and S0/0/1.
B. They are routed to 10.0.0.2.
C. They are routed to 172.16.20.2.
D. They are routed to 192.168.100.2.
Question 74
An engineer must configure an OSPF neighbor relationship between router R1 and R3. The authentication configuration has been configured and the
connecting interfaces are in the same 192.168.1.0/30 subnet. What are the next two steps to complete the configuration? (Choose two)
Explanation
https://www.9tut.com/composite-quiz 25/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
We don’t need to configure hello and dead timers for OSPF neighbor as OSPF can auto negotiate the network type (with the same hello and dead timers on both
sides). We just have to make sure both interfaces are running OSPF and they are in the same area ID.
Question 75
Which type of API allows SDN controllers to dynamically make changes to the network?
A. REST API
B. northbound API
C. southbound API
D. SOAP API
Question 76
What are two roles of Domain Name Services (DNS)? (Choose two)
A. allows a single host name to be shared across more than one IP address
B. encrypts network traffic as it travels across a WAN by default
C. builds a flat structure of DNS names for more efficient IP operations
D. improves security by protecting IP addresses under Fully Qualified Domain Names (FQDNs)
E. enables applications to identify resources by name instead of IP address
Explanation
When you attempt to go to a domain name such as 9tut.com, your browser will instruct your computer to do a DNS lookup on that domain name. This DNS lookup
will query a DNS resolver (for example Google at 8.8.8.8). Once the resolver responds, the computer will usually choose the first IP in the response and use that
for the connection. In the case of multiple IP addresses, the DNS server will respond with multiple IP addresses and the first IP will usually be used for the request.
Due to how most DNS resolvers work, the order of IP addresses usually changes for each request.
Question 77
A network engineer is updating the configuration on router R1 to connect a new branch office to the company network. R2 has been configured correctly.
Which command must the engineer configure so that devices at the new site communicate with the main office?
Question 78
Refer to the exhibit. With which metric was the route to host 172.16.0.202 learned?
A. 38443
B. 110
C. 3184439
D. 0
Explanation
Both the line “O 172.16.0.128/25” and “S 172.16.0.0/24” cover the host 172.16.0.202 but with the “longest (prefix) match” rule the router will choose the first
route.
https://www.9tut.com/composite-quiz 26/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Note: Network 172.16.0.192/29 does not cover host 172.16.0.202. For network 172.16.0.192/29:
Increment: 8
Network address: 172.16.0.192
Broadcast address: 172.16.0.199
Question 79
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
A. The network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.
B. The ISP requires the new subnet to be advertised to the internet for web services.
C. Traffic on the subnet must traverse a site-to-site VPN to an outside organization.
D. There is limited unique address space, and traffic on the new subnet will stay local within the organization.
Question 80
In a CDP environment, what happens when the CDP interface on an adjacent device is configured without an IP address?
A. CDP operates normally, but it cannot provide any information for that neighbor.
B. CDP becomes inoperable on that neighbor.
C. CDP uses the IP address of another interface for that neighbor.
D. CDP operates normally, but it cannot provide IP address information for that neighbor.
Explanation
If a neighbor has no IP address on an interface enabled with Cisco Discovery Protocol, the IP address of another interface will be updated as IP address for the non-
IP address interface.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/cdp/configuration/15-mt/cdp-15-mt-book/nm-cdp-discover.html
Question 81
Question 82
Which two QoS tools are used to guarantee minimum bandwidth to certain traffic? (Choose two)
A. FIFO
B. LLC
C. WFQ
D. RSVP
E. CBWFQ
Explanation
First-in, first-out (FIFO): FIFO entails no concept of priority or classes of traffic. With FIFO, transmission of packets out the interface occurs in the order the
packets arrive, which means no QoS
Weighted fair queueing (WFQ): offers dynamic, fair queuing that divides bandwidth across queues of traffic based on weights. In standard WFQ, packets are
classified into flows according to one of four criteria: the source Internet Protocol address (IP address), the destination IP address, the source Transmission Control
Protocol (TCP) or User Datagram Protocol (UDP) port, or the destination TCP or UDP port.
Class-based weighted fair queueing (CBWFQ) extends the standard WFQ functionality to provide support for user-defined traffic classes. For CBWFQ, you
define traffic classes based on match criteria including protocols, access control lists (ACLs), and input interfaces. Packets satisfying the match criteria for a class
constitute the traffic for that class. A queue is reserved for each class, and traffic belonging to a class is directed to the queue for that class.
Once a class has been defined according to its match criteria, you can assign it characteristics. To characterize a class, you assign it bandwidth, weight, and
maximum packet limit. The bandwidth assigned to a class is the guaranteed bandwidth delivered to the class during congestion.
The Resource Reservation Protocol (RSVP) protocol allows applications to reserve bandwidth for their data flows. It is used by a host, on the behalf of an
application data flow, to request a specific amount of bandwidth from the network. RSVP is also used by the routers to forward bandwidth reservation requests.
Question 83
Drag and drop the characteristic from the left onto the IPv6 address type on the right.
https://www.9tut.com/composite-quiz 27/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13
for first group, 24 for second group).
Explanation
Answer:
Unique Local
+ allows sites to be combined without address conflicts
+ is a counterpart of private IPv4 addresses
Explanation
A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private address. It is not routable on the
global Internet.
Question 84
A. drops packets
B. buffers without queuing packets
C. queues without buffering packets
D. buffers and queues packets
Explanation
The following diagram illustrates the key difference between traffic policing and traffic shaping. Traffic policing propagates bursts. When the traffic rate reaches
the configured maximum rate (or committed information rate), excess traffic is dropped (or remarked). The result is an output rate that appears as a saw-tooth with
crests and troughs. In contrast to policing, traffic shaping retains excess packets in a queue and then schedules the excess for later transmission over
increments of time. The result of traffic shaping is a smoothed packet output rate.
Note: Committed information rate (CIR): The minimum guaranteed data transfer rate agreed to by the routing device.
Question 85
A. It is when the network is saturated with malicious traffic that overloads resources and bandwidth.
B. It is when a new network vulnerability is discovered before a fix is available.
C. It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.
D. It is when an attacker inserts malicious code into a SQL server.
https://www.9tut.com/composite-quiz 28/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Question 86
Question 87
Which device tracks the state of active connections in order to make a decision to forward a packet through?
Explanation
Stateful inspection firewalls keep track of connection status. Ports can be dynamically opened and closed if necessary for completing a transaction. For example,
when you make a connection to a server using HTTP, the server will initiate a new connection back to your system on a random port. A stateful inspection firewall
will automatically open a port for this return connection.
Question 88
Drag and drop the TCP or UDP details from the left onto their corresponding protocols on the right.
Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1324 (which means 13
for first group, 24 for second group).
Explanation
Answer:
TCP
+ requires the client and the server to establish a connection before sending the packet
+ supports reliable data transmission
UDP
+ provides best-effort service
+ transmitted based on data contained in the packet without the need for a data channel
Question 89
Question 90
Which two primary drivers support the need for network automation? (Choose two)
https://www.9tut.com/composite-quiz 29/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
C. Providing a single entry point for resource provisioning
D. Increasing reliance on self-diagnostic and self-healing
E. Eliminating training needs
Question 91
A static route must be configured on R86 to forward traffic for the 172.16.34.0/29 network, which resides on R14. Which command must be used to fulfill
the request?
Question 92
What is the next hop for traffic entering R1 with a destination of 10.1.2.126?
A. 10.165.20.166
B. 10.165.20.226
C. 10.165.20.146
D. 10.165.20.126
Explanation
The static route destined to subnet 10.1.2.112/28 which ranges from 10.1.2.112 to 10.1.2.127 (increment: 16) so it also covers the destination of 10.1.2.126. The
static route also has the lowest AD (of 1) so the router will choose this path.
Question 93
https://www.9tut.com/composite-quiz 30/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Gateway of last resort is 0.0.0.0 to network 0.0.0.0
S* 0.0.0.0/0 is directly connected, Null0
10.0.0.0/8 is variably subnetted, 6 subnets, 2 masks
C 10.0.12.0/24 is directly connected, GigabitEthernet0/1
L 10.0.12.1/32 is directly connected, GigabitEthernet0/1
C 10.0.13.0/24 is directly connected, GigabitEthernet0/2
L 10.0.13.1/32 is directly connected, GigabitEthernet0/2
C 10.0.14.0/24 is directly connected, GigabitEthernet0/3
L 10.0.14.1/32 is directly connected, GigabitEthernet0/3
D 192.168.0.0/16 [90/130816] via 10.0.13.3, 00:10:09, GigabitEthernet0/2
O 192.168.0.0/23 [110/2] via 10.0.14.4, 00:00:46, GigabitEthernet0/3
S 192.168.0.0/24 [100/0] via 10.0.12.2
Explanation
The best match for the destination host 192.168.0.55 is the last statement in the output. But the exit interface of this entry has been hidden so we have to figure it
out. We only know the next hop IP address is 10.0.12.2.
We see only Gi0/1 belongs to this subnet from the entry “C 10.0.12.0/24 is directly connected, GigabitEthernet0/1″ so the best answer is Gi0/1.
Question 94
Drag and drop the statements about AAA from the left onto the corresponding AAA services on the right. Not all options are used.
Please type the corresponding numbers of each item on the left to the blank below and sort them in ascending order. For example: 1325 (which means 13
for first group, 25 for second group).
Explanation
Answer:
Accounting:
+ It records the amount of network resources consumed by the user
+ It tracks the services that a user is using
Authentication:
+ It permits and denies login attempts
+ It supports local, PPP, RADIUS, and TACACS+ options
Explanation
Accounting tracks the services that a user is using. For example, it can log what commands were issued by a user.
Authentication also supports PPP via the “aaa authentication ppp …” command.
Question 95
Which action must be taken so that neighboring devices rapidly discover switch Cat9300?
https://www.9tut.com/composite-quiz 31/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
D. Enable portfast on the ports that connect to neighboring devices
Explanation
The "cdp timer seconds" command sets the transmission frequency of CDP updates in seconds so we should reduce it so that CDP updates are sent more often.
Question 96
Explanation
Now, in turn, the networking administrators and SDN applications want to control the controller! So the controller need a northbound interface (NBI) to
communicate with us. The NBI applications included various network services, including network virtualization, dynamic virtual network provisioning, firewall
monitoring, user identity management and access policy control.
Question 97
A. Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access.
B. Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the
network
C. Authentication is used to verify a person’s identity, and authorization is used to create syslog messages for logins
D. Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access
Question 98
A router running EIGRP has learned the same route from two different paths. Which parameter does the router use to select the best path?
A. cost
B. metric
C. administrative distance
D. as-path
Question 99
OSPF must be configured between routers R1 and R2. Which OSPF configuration must be applied to router R1 to avoid a DR/BDR election?
A. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
interface e1/1
ip address 192.168.1.1 255.255.255.252
ip ospf cost 0
B. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
interface e1/1
ip address 192.168.1.1 255.55.255.252
ip ospf network point-to-point
C. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
interface e1/1
ip address 192.160.1.1 255.255.255.252
ip ospf network broadcast
D. router ospf 1
network 192.168.1.1 0.0.0.0 area 0
hello interval 15
interface e1/1
ip address 192.168.1.1 255.255.255.252
https://www.9tut.com/composite-quiz 32/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Question 100
Drag and drop the functions from the left onto the correct network components on the right.
Please type the corresponding numbers of each item on the left to the blank below and arrange them ascendingly. For example: 13524 (which means 135
for first group, 24 for second group)
Question 101
What mechanism carries multicast traffic between remote sites and supports encryption?
Question 102
Explanation
The HTTP PUT request method creates a new resource or replaces a representation of the target resource with the request payload -> Answer 'It replaces data at the
destination. ' is correct.
The difference between PUT and POST is that PUT is idempotent: calling it once or several times successively has the same effect (that is no side effect), whereas
successive identical POST requests may have additional effects, akin to placing an order several times -> Answer 'It is a nonidempotent operation' is not correct.
Reference: https://developer.mozilla.org/en-US/docs/Web/HTTP/Methods/PUT
1. ahmed
May 16th, 2020
tnk you
2. JC
May 24th, 2020
Hi, in the question about Drag and drop the networking parameters from the left on to the correct values on the right with connection oriented and connection
less, I put as a connection oriented SMTP, SSH and FTP and connectionless SNMP, VoIP and TFTP, I think its the correct answer but you put as I failed,
could you check it please?
3. op
May 27th, 2020
Hi,
Question 63
Drag and drop the networking parameters from the left on to the correct values on the right.
Connection_Oriented_Connectionless.jpg
Please type the corresponding numbers of each item on the left to the blank below and arrange them ascendingly. For example: 136245 (which means 136 for
first group, 245 for second group)
4. 9tut
May 27th, 2020
https://www.9tut.com/composite-quiz 33/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
@op, @JC: Thanks for your detection, there was an error with Q.63. We have just updated it so please try again!
5. op
May 28th, 2020
Question 50
Drag and drop the application protocols from the left onto the suitable transport protocols on the right.
TCP_UDP_Protocols_2.jpg
Please type the corresponding numbers of each item on the left to the blank below and arrange them ascendingly. For example: 136245 (which means 136 for
first group, 245 for second group)
6. op
May 28th, 2020
7. 9tut
May 28th, 2020
8. op
May 28th, 2020
Thanks.
9. op
June 1st, 2020
Question 72
Refer to the exhibit. If the network environment is operating normally, which type of device must be connected to interface FastEthernet 0/1?
10. 9tut
June 1st, 2020
@op: We have just updated this question. Answer “C. router” is correct.
11. op
June 1st, 2020
12. op
June 3rd, 2020
Question 82
Refer to the exhibit. What configuration on R1 denies SSH access from PC-1 to any R1 interface and allows all other traffic?
access_list_ssh.jpg
https://www.9tut.com/composite-quiz 34/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Is this correct?
13. Pawel
June 3rd, 2020
@9tut
There is something wrong with 102q test – I had only 1 mistake but score was only 93% – some of the correct answers doesn’t count or something. (I think
the new ones because I didn’t had any problem before update)
14. JH
June 5th, 2020
15. TheMattMeister
June 6th, 2020
Hey all,
just passed exam with a 963/1000! if you can knock out the 102 composite quiz with an A several times (i think i ended up running through it 10 times), i’m
sure you can pass this test. With the exception of a few questions that i’ve either just seen less or were just new, the test is identical.
good luck!
16. Mah
June 6th, 2020
Hi @9tut,
Im sorry to ask, can you kindly explain Q13 I think the answer is 10.4.4.4 which is C Please?
17. 9tut
June 7th, 2020
@Mah: Could you please post that question here as the questions in the Composite Quizzes are shuffled each time you take the quiz?
Comments are closed.
Composite Quiz 20 Questions CCNAv7 (2020) – New Questions Part 2 Question 38 to 43
Logout
CCNA 200-301
Basic Questions
Topology Architecture Questions
Cloud & Virtualization Questions
CDP & LLDP Questions
Switch Questions
VLAN & Trunking Questions
VLAN & Trunking Questions 2
STP & VTP Questions
EtherChannel Questions
TCP & UDP Questions
IP Address & Subnetting Questions
IP Routing Questions
IP Routing Questions 2
OSPF Questions
https://www.9tut.com/composite-quiz 35/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
OSPF Questions 2
EIGRP Questions
NAT Questions
NTP Questions
Syslog Questions
HSRP Questions
Access-list Questions
AAA Questions
Security Questions
Security Questions 2
DAI Questions
IPv6 Questions
DNS Questions
QoS Questions
Port Security Questions
Wireless Questions
Wireless Questions 2
SDN Questions
DNA Center Questions
Drag Drop Questions
Drag Drop Questions 2
Drag Drop Questions 3
VPN Questions
DHCP Questions
Automation Questions
Miscellaneous Questions
CCNA FAQs & Tips
Share your CCNA Experience
CCNA Self-Study
Practice CCNA GNS3 Labs
CCNA Knowledge
CCNA Lab Challenges
Puppet Tutorial
Chef Tutorial
Ansible Tutorial
JSON Tutorial
Layer 2 Threats and Security Features
AAA TACACS+ and RADIUS Tutorial
STP Root Port Election Tutorial
GRE Tunnel Tutorial
Basic MPLS Tutorial
TCP and UDP Tutorial
Border Gateway Protocol BGP Tutorial
Point to Point Protocol (PPP) Tutorial
WAN Tutorial
DHCP Tutorial
Simple Network Management Protocol SNMP Tutorial
Syslog Tutorial
Gateway Load Balancing Protocol GLBP Tutorial
EtherChannel Tutorial
Hot Standby Router Protocol HSRP Tutorial
InterVLAN Routing Tutorial
Cisco Command Line Interface CLI
Cisco Router Boot Sequence Tutorial
OSI Model Tutorial
Subnetting Tutorial – Subnetting Made Easy
Frame Relay Tutorial
Wireless Tutorial
Virtual Local Area Network VLAN Tutorial
VLAN Trunking Protocol VTP Tutorial
IPv6 Tutorial
Rapid Spanning Tree Protocol RSTP Tutorial
Spanning Tree Protocol STP Tutorial
Network Address Translation NAT Tutorial
Access List Tutorial
RIP Tutorial
EIGRP Tutorial
OSPF Tutorial
Network Resources
Free Router Simulators
CCNA Website
ENCOR Website
ENSDWI Website
ENARSI Website
DevNet Website
CCIE R&S Website
Security Website
Wireless Website
https://www.9tut.com/composite-quiz 36/37
04/08/2023 17:03 CCNA Training » Composite Quiz 102 Questions
Design Website
Data Center Website
Service Provider Website
Collaboration Website
Top
https://www.9tut.com/composite-quiz 37/37