CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security,
Automation
Study online at https://quizlet.com/_961azg
1. Which design feature will limit the use of the building switch block approach
the size of a failure domain in
an enterprise network?
2. Which two things should a net- the configuration register value
work administrator modify on the startup configuration file
a router to perform password
recovery? (Choose two.)
3. What type of network uses one converged
common infrastructure to car-
ry voice, data, and video sig-
nals?
4. What are three advantages of hides private LAN addressing from outside devices that are
using private IP addresses and connected to the Internet
NAT? (Choose three.)
permits LAN expansion without additional public IP address-
es
conserves registered public IP addresses
5. Which two scenarios are exam- A mobile sales agent is connecting to the company network
ples of remote access VPNs? via the Internet connection at a hotel.
(Choose two.)
An employee who is working from home uses VPN client
software on a laptop in order to connect to the company
network.
6. What are three benefits of It streamlines the IT operations of an organization by sub-
cloud computing? (Choose scribing only to needed services.
three.)
It enables access to organizational data anywhere and at any
, CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security,
Automation
Study online at https://quizlet.com/_961azg
time.
It eliminates or reduces the need for onsite IT equipment,
maintenance, and management.
7. What is a characteristic of a sin- All routers are in the backbone area.
gle-area OSPF network?
8. A network administrator has data center
been tasked with creating a dis-
aster recovery plan. As part of
this plan, the administrator is
looking for a backup site for
all of the data on the company
servers. What service or tech-
nology would support this re-
quirement?
9. Which type of OSPF packet is hello
used by a router to discover
neighbor routers and establish
neighbor adjacency?
10. Which two statements are A virus can be dormant and then activate at a specific time or
characteristics of a virus? date.
(Choose two.)
A virus typically requires end-user activation
The type of end user interaction required to launch a virus
is typically opening an application, opening a web page, or
powering on the computer. Once activated, a virus may infect
, CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security,
Automation
Study online at https://quizlet.com/_961azg
other files located on the computer or other computers on
the same network.
11. Which public WAN access tech- DSL
nology utilizes copper tele-
phone lines to provide access
to subscribers that are multi-
plexed into a single T3 link con-
nection?
12. A customer needs a metro- Ethernet WAN
politan area WAN connection
that provides high-speed, ded-
icated bandwidth between two
sites. Which type of WAN con-
nection would best fulfill this
need?
13. A company has contracted with to reverse engineer binary files when writing exploits and
a network security firm to help when analyzing malware
identify the vulnerabilities of
the corporate network. The
firm sends a team to perform
penetration tests to the com-
pany network. Why would the
team use debuggers?
14. What command would be used clear ip nat translation
as part of configuring NAT or
PAT to clear dynamic entries
before the timeout has ex-
pired?
, CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security,
Automation
Study online at https://quizlet.com/_961azg
15. What are two characteristics of Video traffic latency should not exceed 400 ms.
video traffic? (Choose two.) Video traffic is unpredictable and inconsistent.
16. In setting up a small office net- NAT
work, the network administra-
tor decides to assign private IP
addresses dynamically to work-
stations and mobile devices.
Which feature must be enabled
on the company router in order
for office devices to access the
internet?
17. A data center has recently up- virtualization
dated a physical server to host
multiple operating systems on
a single CPU. The data cen-
ter can now provide each cus-
tomer with a separate web
server without having to allo-
cate an actual discrete server
for each customer. What is the
networking trend that is being
implemented by the data cen-
ter in this situation?
18. Which two IPsec protocols are MD5
used to provide data integrity? SHA
19. If an outside host does not The host initiates a clientless VPN connection using a com-
have the Cisco AnyConnect pliant web browser to download the client.
Automation
Study online at https://quizlet.com/_961azg
1. Which design feature will limit the use of the building switch block approach
the size of a failure domain in
an enterprise network?
2. Which two things should a net- the configuration register value
work administrator modify on the startup configuration file
a router to perform password
recovery? (Choose two.)
3. What type of network uses one converged
common infrastructure to car-
ry voice, data, and video sig-
nals?
4. What are three advantages of hides private LAN addressing from outside devices that are
using private IP addresses and connected to the Internet
NAT? (Choose three.)
permits LAN expansion without additional public IP address-
es
conserves registered public IP addresses
5. Which two scenarios are exam- A mobile sales agent is connecting to the company network
ples of remote access VPNs? via the Internet connection at a hotel.
(Choose two.)
An employee who is working from home uses VPN client
software on a laptop in order to connect to the company
network.
6. What are three benefits of It streamlines the IT operations of an organization by sub-
cloud computing? (Choose scribing only to needed services.
three.)
It enables access to organizational data anywhere and at any
, CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security,
Automation
Study online at https://quizlet.com/_961azg
time.
It eliminates or reduces the need for onsite IT equipment,
maintenance, and management.
7. What is a characteristic of a sin- All routers are in the backbone area.
gle-area OSPF network?
8. A network administrator has data center
been tasked with creating a dis-
aster recovery plan. As part of
this plan, the administrator is
looking for a backup site for
all of the data on the company
servers. What service or tech-
nology would support this re-
quirement?
9. Which type of OSPF packet is hello
used by a router to discover
neighbor routers and establish
neighbor adjacency?
10. Which two statements are A virus can be dormant and then activate at a specific time or
characteristics of a virus? date.
(Choose two.)
A virus typically requires end-user activation
The type of end user interaction required to launch a virus
is typically opening an application, opening a web page, or
powering on the computer. Once activated, a virus may infect
, CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security,
Automation
Study online at https://quizlet.com/_961azg
other files located on the computer or other computers on
the same network.
11. Which public WAN access tech- DSL
nology utilizes copper tele-
phone lines to provide access
to subscribers that are multi-
plexed into a single T3 link con-
nection?
12. A customer needs a metro- Ethernet WAN
politan area WAN connection
that provides high-speed, ded-
icated bandwidth between two
sites. Which type of WAN con-
nection would best fulfill this
need?
13. A company has contracted with to reverse engineer binary files when writing exploits and
a network security firm to help when analyzing malware
identify the vulnerabilities of
the corporate network. The
firm sends a team to perform
penetration tests to the com-
pany network. Why would the
team use debuggers?
14. What command would be used clear ip nat translation
as part of configuring NAT or
PAT to clear dynamic entries
before the timeout has ex-
pired?
, CCNA 3 v7.0 Final Exam Answers Full - Enterprise Networking, Security,
Automation
Study online at https://quizlet.com/_961azg
15. What are two characteristics of Video traffic latency should not exceed 400 ms.
video traffic? (Choose two.) Video traffic is unpredictable and inconsistent.
16. In setting up a small office net- NAT
work, the network administra-
tor decides to assign private IP
addresses dynamically to work-
stations and mobile devices.
Which feature must be enabled
on the company router in order
for office devices to access the
internet?
17. A data center has recently up- virtualization
dated a physical server to host
multiple operating systems on
a single CPU. The data cen-
ter can now provide each cus-
tomer with a separate web
server without having to allo-
cate an actual discrete server
for each customer. What is the
networking trend that is being
implemented by the data cen-
ter in this situation?
18. Which two IPsec protocols are MD5
used to provide data integrity? SHA
19. If an outside host does not The host initiates a clientless VPN connection using a com-
have the Cisco AnyConnect pliant web browser to download the client.