CCNA 3 V7 – ENTERPRISE NETWORKING, SECURITY, AND
AUTOMATION FINAL EXAM GUIDE
1. What functionality does mGRE provide to the DMVPN technology?
A. It enables static tunnel configurations between all routers.
B. It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the
hub and dynamically allocated tunnel destinations at the spokes.
C. It restricts communication to only hub-and-spoke topologies.
D. It eliminates the need for encryption in VPNs.
Answer: B. It allows the creation of dynamically allocated tunnels through a permanent tunnel source
at the hub and dynamically allocated tunnel destinations at the spokes.
Rationale: Multipoint GRE (mGRE) enables a single GRE interface to support multiple IPsec tunnels,
allowing dynamic creation of tunnels between spokes without the need for pre-configured static
tunnels.
2. Which statement accurately describes a characteristic of IPsec?
A. IPsec is a proprietary protocol developed by Cisco.
B. IPsec operates only at the application layer.
C. IPsec is a framework of open standards that relies on existing algorithms.
D. IPsec requires manual key management for all implementations.
Answer: C. IPsec is a framework of open standards that relies on existing algorithms.
Rationale: IPsec is a suite of protocols designed to secure IP communications by authenticating and
encrypting each IP packet in a communication session. It is based on open standards and utilizes existing
cryptographic algorithms.
3. Which type of API would be used to allow authorized salespeople of an organization access to
internal sales data from their mobile devices?
A. Public API
B. Partner API
C. Private API
D. Composite API
Answer: C. Private API
,ESTUDYR
Rationale: Private APIs, also known as internal APIs, are designed for use within an organization. They
allow authorized personnel to access internal systems and data securely.
4. What HTTP method is typically used to create a new resource?
A. POST
B. GET
C. PUT
D. DELETE
Answer: A. POST
Rationale: The POST method is used to submit data to be processed to a specified resource, often
resulting in the creation of a new resource.
5. What HTTP method is used to retrieve data from a server?
A. POST
B. GET
C. PUT
D. DELETE
Answer: B. GET
Rationale: The GET method requests data from a specified resource without making any changes to it.
6. What HTTP method is used to update an existing resource entirely?
A. POST
B. GET
C. PUT
D. DELETE
Answer: C. PUT
Rationale: The PUT method replaces all current representations of the target resource with the
uploaded content.
7. What HTTP method is used to delete a resource?
,ESTUDYR
A. POST
B. GET
C. PUT
D. DELETE
Answer: D. DELETE
Rationale: The DELETE method removes the specified resource from the server
8. What are two syntax rules for writing a JSON array? (Choose two.)
A. Each value in the array is separated by a comma.
B. Values are enclosed in square brackets.
C. Each key in the array must be unique.
D. Arrays must contain at least one value.
Answers: A. Each value in the array is separated by a comma. and B. Values are enclosed in square
brackets.
Rationale: In JSON, arrays are ordered lists of values enclosed in square brackets, with each value
separated by a comma.
9. An administrator is trying to configure PAT on R1, but PC-A is unable to access the Internet. The
administrator tries to ping a server on the Internet from PC-A and collects the debugs. Based on this
output, what is most likely the cause of the problem?
A. The NAT pool is exhausted.
B. The inside global address is not on the same subnet as the ISP.
C. The access list is misconfigured.
D. The default route is missing.
Answer: B. The inside global address is not on the same subnet as the ISP.
Rationale: If the inside global address assigned by PAT is not within the same subnet as the ISP, the ISP
will not route the return traffic correctly, leading to connectivity issues.
10. R1 is configured for NAT as displayed. What is wrong with the configuration?
A. The NAT pool is not defined.
B. NAT-POOL2 is not bound to ACL 1.
C. The overload keyword is missing.
D. The interfaces are not properly assigned as inside or outside.
, ESTUDYR
Answer: B. NAT-POOL2 is not bound to ACL 1.
Rationale: For NAT to function, the NAT pool must be associated with an access control list (ACL) that
defines which internal addresses are to be translated.
11. A network administrator is trying to configure PAT on R1, but PC-A is unable to access the Internet.
Based on the debug output, what is most likely the cause of the problem?
A. The NAT pool is exhausted.
B. The inside global address is not on the same subnet as the ISP.
C. The access list is misconfigured.
D. The default route is missing.
Answer: B. The inside global address is not on the same subnet as the ISP.
Rationale: For successful NAT operation, the inside global address assigned must be routable by the ISP.
If it's not within the same subnet as the ISP, return traffic cannot reach the internal hosts, leading to
connectivity issues.
12. Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?
A. The NAT pool is not defined.
B. NAT-POOL2 is not bound to ACL 1.
C. The overload keyword is missing.
D. The interfaces are not properly assigned as inside or outside.
Answer: B. NAT-POOL2 is not bound to ACL 1.
Rationale: For NAT to function, the NAT pool must be associated with an access control list (ACL) that
defines which internal addresses are to be translated. Without this binding, NAT translations won't
occur as expected.
13. What is the purpose of the command ip nat inside source list 1 pool NAT-POOL2?
A. It defines the inside and outside interfaces for NAT.
B. It binds the NAT pool to the access list for translation.
C. It creates a static NAT mapping.
D. It enables NAT overload.
Answer: B. It binds the NAT pool to the access list for translation.
Rationale: This command specifies that traffic matching access list 1 will be translated using addresses
from NAT-POOL2. It's essential for dynamic NAT configurations.