1/162
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which design feature will limit the size of a failure domain in an enterprise network?
4
Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)
3,4
What type of network uses one common infrastructure to carry voice, data, and video signals?
2
What are three advantages of using private IP addresses and NAT? (Choose three.)
1,2,6
Which two scenarios are examples of remote access VPNs? (Choose two.)
4,5
What are three benefits of cloud computing? (Choose three.)
3,4,6
What is a characteristic of a single-area OSPF network?
3
What is a WAN?
2
A network administrator has been tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement?
1
Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?
2
Which two statements are characteristics of a virus? (Choose two.)
2,5
Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?
2
A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need?
2
A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?
2
Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?
R1#
Standard IP access list 2
10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)
20 deny any (1 match)
2
What command would be used as part of configuring NAT or PAT to clear dynamic entries before the timeout has expired?
2
What are two characteristics of video traffic? (Choose two.)
2,5
In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet?
3
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
3
Which two IPsec protocols are used to provide data integrity?
1,4
If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?
2
A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)
1,4
Which type of QoS marking is applied to Ethernet frames?
4
Which is a characteristic of a Type 2 hypervisor?
1
What are the two types of VPN connections? (Choose two.)
3,4
What functionality does mGRE provide to the DMVPN technology?
1
What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets?
3
What command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the pool?
2
What is a purpose of establishing a network baseline?
2
Which statement describes a characteristic of standard IPv4 ACLs?
1
A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa?
3
What are two syntax rules for writing a JSON array? (Choose two.)
1,5
What is a characteristic of a Trojan horse as it relates to network security?
2
An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?
3
A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?
3
A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?
4
An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?
2
What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?
2
An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .
If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?
1
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?
4
Which two scenarios would result in a duplex mismatch? (Choose two.)
1,5
A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?
2
What are two types of attacks used on DNS open resolvers? (Choose two.)
1,2
An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet .
If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied?
1
An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.0.15 eq telnet .
If a packet with a source address of 192.168.100.219, a destination address of 64.100.40.10, and a protocol of 54 is received on the interface, is the packet permitted or denied?
1
Which type of resources are required for a Type 1 hypervisor?
2
In JSON, what is held within square brackets [ ]?
4
What are three components used in the query portion of a typical RESTful API request? (Choose three.)
4,5,6
A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?
3
Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?
3
Which statement describes a characteristic of Cisco Catalyst 2960 switches?
2
Which component of the ACI architecture translates application policies into network programming?
2
Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
3,5
What are two benefits of using SNMP traps? (Choose two.)
1,2
Which statement accurately describes a characteristic of IPsec?
5
In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)
3,5
Which two statements describe the use of asymmetric algorithms? (Choose two.)
3,4
What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)
1,3
What are two purposes of launching a reconnaissance attack on a network? (Choose two.)
1,3
A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?
1
An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns .
If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?
2
What QoS step must occur before packets can be marked?
1
What is the main function of a hypervisor?
1
A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended?
2
An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 10.1.3.8 eq dns .
If a packet with a source address of 10.1.3.8, a destination address of 10.10.3.8, and a protocol of 53 is received on the interface, is the packet permitted or denied?
1
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
3
Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?
1
Why is QoS an important issue in a converged network that combines voice, video, and data communications?
2
Which statement describes a VPN?
4
In which OSPF state is the DR/BDR election conducted?
3
Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?
5
What is the final operational state that will form between an OSPF DR and a DROTHER once the routers reach convergence?
3
Which type of server would be used to keep a historical record of messages from monitored network devices?
4
When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)
2,3
In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?
3
What protocol sends periodic advertisements between connected Cisco devices in order to learn device name, IOS version, and the number and type of interfaces?
1
An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?
3
Which type of OSPFv2 packet is used to forward OSPF link change information?
2
What protocol synchronizes with a private master clock or with a publicly available server on the internet?
4
Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?
4
An OSPF router has three directly connected networks; 10.0.0.0/16, 10.1.0.0/16, and 10.2.0.0/16. Which OSPF network command would advertise only the 10.1.0.0 network to neighbors?
1
An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF network statement?
2
How does virtualization help with disaster recovery within a data center?
3
How does virtualization help with disaster recovery within a data center?
3
How does virtualization help with disaster recovery within a data center
1
Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?
2
Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?
2
What protocol uses agents, that reside on managed devices, to collect and store information about the device and its operation?
4
An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 10.27.27.0 255.255.255.0. What wildcard mask would the administrator use in the OSPF network statement?
2
When will an OSPF-enabled router transition from the Down state to the Init state?
1
What type of traffic is described as having a high volume of data per packet?
2
What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?
1
Which step in the link-state routing process is described by a router running an algorithm to determine the best path to each destination?
4
Which type of VPN connects using the Transport Layer Security (TLS) feature?
1
Which group of APIs are used by an SDN controller to communicate with various applications?
3
A company has consolidated a number of servers and it is looking for a program or firmware to create and control virtual machines which have access to all the hardware of the consolidated servers. What service or technology would support this requirement?
3
What command would be used as part of configuring NAT or PAT to identify inside local addresses that are to be translated?
3
Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting, what service or technology would support requirement?
1
Which three types of VPNs are examples of enterprise-managed site-to-site VPNs? (Choose three.)
2,3,4
In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.)
1,5