Cisco Final

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/162

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

163 Terms

1
New cards

Which design feature will limit the size of a failure domain in an enterprise network?

  1. the purchase of enterprise equipment that is designed for large traffic volume
  2. the installation of redundant power supplies
  3. the use of a collapsed core design
  4. the use of the building switch block approach

4

2
New cards

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

  1. the system image file
  2. the NVRAM file system
  3. the configuration register value
  4. the startup configuration file
  5. system ROM

3,4

3
New cards

What type of network uses one common infrastructure to carry voice, data, and video signals?

  1. borderless
  2. converged
  3. managed
  4. switched

2

4
New cards

What are three advantages of using private IP addresses and NAT? (Choose three.)

  1. hides private LAN addressing from outside devices that are connected to the Internet
  2. permits LAN expansion without additional public IP addresses
  3. reduces CPU usage on customer routers
  4. creates multiple public IP addresses
  5. improves the performance of the router that is connected to the Internet
  6. conserves registered public IP addresses

1,2,6

5
New cards

Which two scenarios are examples of remote access VPNs? (Choose two.)

  1. All users at a large branch office can access company resources through a single VPN connection.
  2. A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.
  3. A toy manufacturer has a permanent VPN connection to one of its parts suppliers.
  4. A mobile sales agent is connecting to the company network via the Internet connection at a hotel.
  5. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

4,5

6
New cards

What are three benefits of cloud computing? (Choose three.)

  1. It utilizes end-user clients to do a substantial amount of data preprocessing and storage.
  2. It uses open-source software for distributed processing of large datasets.
  3. It streamlines the IT operations of an organization by subscribing only to needed services.
  4. It enables access to organizational data anywhere and at any time.
  5. It turns raw data into meaningful information by discovering patterns and relationships.
  6. It eliminates or reduces the need for onsite IT equipment, maintenance, and management.

3,4,6

7
New cards

What is a characteristic of a single-area OSPF network?

  1. All routers share a common forwarding database.
  2. All routers have the same neighbor table.
  3. All routers are in the backbone area.
  4. All routers have the same routing table.

3

8
New cards

What is a WAN?

  1. a network infrastructure that spans a limited physical area such as a city
  2. a network infrastructure that provides access to other networks over a large geographic area
  3. a network infrastructure that provides access in a small geographic area
  4. a network infrastructure designed to provide data storage, retrieval, and replication

2

9
New cards

A network administrator has been tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement?

  1. data center
  2. virtualization
  3. dedicated servers
  4. software defined networking

1

10
New cards

Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?

  1. link-state update
  2. hello
  3. database description
  4. link-state request

2

11
New cards

Which two statements are characteristics of a virus? (Choose two.)

  1. A virus has an enabling vulnerability, a propagation mechanism, and a payload.
  2. A virus can be dormant and then activate at a specific time or date.
  3. A virus provides the attacker with sensitive data, such as passwords.
  4. A virus replicates itself by independently exploiting vulnerabilities in networks.
  5. A virus typically requires end-user activation.

2,5

12
New cards

Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?

  1. ISDN
  2. DSL
  3. cable
  4. dialup

2

13
New cards

A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need?

  1. packet-switched network
  2. Ethernet WAN
  3. circuit-switched network
  4. MPLS

2

14
New cards

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?

  1. to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
  2. to reverse engineer binary files when writing exploits and when analyzing malware
  3. to obtain specially designed operating systems preloaded with tools optimized for hacking
  4. to detect any evidence of a hack or malware in a computer or network

2

15
New cards

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown?
R1#
Standard IP access list 2
10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches)
20 deny any (1 match)

  1. Two devices connected to the router have IP addresses of 192.168.10. x .
  2. Two devices were able to use SSH or Telnet to gain access to the router.
  3. Traffic from one device was not allowed to come into one router port and be routed outbound a different router port.
  4. Traffic from two devices was allowed to enter one router port and be routed outbound to a different router port.

2

16
New cards

What command would be used as part of configuring NAT or PAT to clear dynamic entries before the timeout has expired?

  1. clear ip dhcp
  2. clear ip nat translation
  3. clear access-list counters
  4. clear ip pat statistics

2

17
New cards

What are two characteristics of video traffic? (Choose two.)

  1. Video traffic consumes less network resources than voice traffic consumes.
  2. Video traffic latency should not exceed 400 ms.
  3. Video traffic is more resilient to loss than voice traffic is.
  4. Video traffic requires a minimum of 30 kbs of bandwidth.
  5. Video traffic is unpredictable and inconsistent.

2,5

18
New cards

In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet?

  1. UPnP
  2. MAC filtering
  3. NAT
  4. QoS

3

19
New cards

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

  1. online collaboration
  2. BYOD
  3. virtualization
  4. maintaining communication integrity

3

20
New cards

Which two IPsec protocols are used to provide data integrity?

  1. MD5
  2. DH
  3. AES
  4. SHA
  5. RSA

1,4

21
New cards

If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?

  1. The Cisco AnyConnect client is installed by default on most major operating systems.
  2. The host initiates a clientless VPN connection using a compliant web browser to download the client.
  3. The host initiates a clientless connection to a TFTP server to download the client.
  4. The host initiates a clientless connection to an FTP server to download the client.

2

22
New cards

A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)

  1. leased line
  2. cable
  3. digital subscriber line
  4. Ethernet WAN
  5. municipal Wi-Fi

1,4

23
New cards

Which type of QoS marking is applied to Ethernet frames?

  1. IP precedence
  2. DSCP
  3. ToS
  4. CoS

4

24
New cards

Which is a characteristic of a Type 2 hypervisor?

  1. does not require management console software
  2. has direct access to server hardware resources
  3. best suited for enterprise environments
  4. installs directly on hardware

1

25
New cards

What are the two types of VPN connections? (Choose two.)

  1. PPPoE
  2. Frame Relay
  3. site-to-site
  4. remote access
  5. leased line

3,4

26
New cards

What functionality does mGRE provide to the DMVPN technology?

  1. It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.
  2. It provides secure transport of private information over public networks, such as the Internet.
  3. It is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner.
  4. It creates a distributed mapping database of public IP addresses for all VPN tunnel spokes.

1

27
New cards

What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets?

  1. the FIB
  2. the routing table
  3. the ARP table
  4. the DSP

3

28
New cards

What command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the pool?

  1. show running-config
  2. show ip nat statistics
  3. show ip cache
  4. show version

2

29
New cards

What is a purpose of establishing a network baseline?

  1. It provides a statistical average for network performance.
  2. It creates a point of reference for future network evaluations.
  3. It manages the performance of network devices.
  4. It checks the security configuration of network devices.

2

30
New cards

Which statement describes a characteristic of standard IPv4 ACLs?

  1. They filter traffic based on source IP addresses only.
  2. They can be created with a number but not with a name.
  3. They are configured in the interface configuration mode.
  4. They can be configured to filter traffic based on both source IP addresses and source ports.

1

31
New cards

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa?

  1. to capture and analyze packets within traditional Ethernet LANs or WLANs
  2. to probe and test the robustness of a firewall by using specially created forged packets
  3. to make repeated guesses in order to crack a password

3

32
New cards

What are two syntax rules for writing a JSON array? (Choose two.)

  1. Each value in the array is separated by a comma.
  2. The array can include only one value type.
  3. A space must separate each value in the array.
  4. A semicolon separates the key and list of values.
  5. Values are enclosed in square brackets.

1,5

33
New cards

What is a characteristic of a Trojan horse as it relates to network security?

  1. An electronic dictionary is used to obtain a password to be used to infiltrate a key network device.
  2. Malware is contained in a seemingly legitimate executable program.
  3. Extreme quantities of data are sent to a particular network device interface.
  4. Too much information is destined for a particular memory block, causing additional memory areas to be affected

2

34
New cards

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

  1. TCP SYN flood
  2. DNS tunneling
  3. DHCP spoofing
  4. ARP cache poisoning

3

35
New cards

A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?

  1. data integrity
  2. non-repudiation
  3. origin authentication
  4. data confidentiality

3

36
New cards

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?

  1. to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network
  2. to detect any evidence of a hack or malware in a computer or network
  3. to probe and test the robustness of a firewall by using specially created forged packets
  4. to capture and analyze packets within traditional Ethernet LANs or WLANs

4

37
New cards

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.0.15.255
  2. 0.0.3.255
  3. 0.0.7.255
  4. 0.0.1.255

2

38
New cards

What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?

  1. to activate the OSPF neighboring process
  2. to influence the DR/BDR election process
  3. to provide a backdoor for connectivity during the convergence process
  4. to streamline and speed up the convergence process

2

39
New cards

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .
If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?

  1. Permitted
  2. Denied

1

40
New cards

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?

  1. The spine and leaf switches are always linked through core switches.
  2. The spine switches attach to the leaf switches and attach to each other for redundancy.
  3. The leaf switches always attach to the spines and they are interlinked through a trunk line.
  4. The leaf switches always attach to the spines, but they never attach to each other.

4

41
New cards

Which two scenarios would result in a duplex mismatch? (Choose two.)

  1. connecting a device with autonegotiation to another that is manually set to full-duplex
  2. starting and stopping a router interface during a normal operation
  3. connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps
  4. configuring dynamic routing incorrectly
  5. manually setting the two connected devices to different duplex modes

1,5

42
New cards

A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?

  1. authenticates a packet by a string match of the username or community string
  2. authenticates a packet by using either the HMAC with MD5 method or the SHA method
  3. authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA algorithms and encrypts the packet with either the DES, 3DES or AES algorithms
  4. authenticates a packet by using the SHA algorithm only

2

43
New cards

What are two types of attacks used on DNS open resolvers? (Choose two.)

  1. amplification and reflection
  2. resource utilization
  3. fast flux
  4. ARP poisoning
  5. Cushioning

1,2

44
New cards

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet .
If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied?

  1. denied
  2. permitted

1

45
New cards

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.0.15 eq telnet .
If a packet with a source address of 192.168.100.219, a destination address of 64.100.40.10, and a protocol of 54 is received on the interface, is the packet permitted or denied?

  1. denied
  2. permitted

1

46
New cards

Which type of resources are required for a Type 1 hypervisor?

  1. a dedicated VLAN
  2. a management console
  3. a host operating system
  4. a server running VMware Fusion

2

47
New cards

In JSON, what is held within square brackets [ ]?

  1. nested values
  2. key/value pairs
  3. an object
  4. an array

4

48
New cards

What are three components used in the query portion of a typical RESTful API request? (Choose three.)

  1. resources
  2. protocol
  3. API server
  4. format
  5. key
  6. parameters

4,5,6

49
New cards

A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?

  1. top-down
  2. bottom-up
  3. divide-and-conquer
  4. substitution

3

50
New cards

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

  1. MD5
  2. AES
  3. IPsec
  4. ESP

3

51
New cards

Which statement describes a characteristic of Cisco Catalyst 2960 switches?

  1. They are best used as distribution layer switches.
  2. New Cisco Catalyst 2960-C switches support PoE pass-through.
  3. They are modular switches.
  4. They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.

2

52
New cards

Which component of the ACI architecture translates application policies into network programming?

  1. the hypervisor
  2. the Application Policy Infrastructure Controller
  3. the Nexus 9000 switch
  4. the Application Network Profile endpoints

2

53
New cards

Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)

  1. device type
  2. cable specification
  3. interface identifier
  4. OS/IOS version
  5. connection type
  6. cable type and identifier

3,5

54
New cards

What are two benefits of using SNMP traps? (Choose two.)

  1. They eliminate the need for some periodic polling requests.
  2. They reduce the load on network and agent resources.
  3. They limit access for management systems only.
  4. They can provide statistics on TCP/IP packets that flow through Cisco devices.
  5. They can passively listen for exported NetFlow datagrams.

1,2

55
New cards

Which statement accurately describes a characteristic of IPsec?

  1. IPsec works at the application layer and protects all application data.
  2. IPsec is a framework of standards developed by Cisco that relies on OSI algorithms.
  3. IPsec is a framework of proprietary standards that depend on Cisco specific algorithms.
  4. IPsec works at the transport layer and protects data at the network layer.
  5. IPsec is a framework of open standards that relies on existing algorithms.

5

56
New cards

In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)

  1. connect users to the network
  2. provide a high-speed network backbone
  3. connect remote networks
  4. provide Power over Ethernet to devices
  5. provide data traffic security

3,5

57
New cards

Which two statements describe the use of asymmetric algorithms? (Choose two.)

  1. Public and private keys may be used interchangeably.
  2. If a public key is used to encrypt the data, a public key must be used to decrypt the data.
  3. If a private key is used to encrypt the data, a public key must be used to decrypt the data.
  4. If a public key is used to encrypt the data, a private key must be used to decrypt the data.
  5. If a private key is used to encrypt the data, a private key must be used to decrypt the data.

3,4

58
New cards

What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

  1. reduced costs
  2. decreased number of critical points of failure
  3. increased flexibility
  4. increased bandwidth availability
  5. increased network management options

1,3

59
New cards

What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

  1. to scan for accessibility
  2. to retrieve and modify data
  3. to gather information about the network and devices
  4. to prevent other users from accessing the system
  5. to escalate access privileges

1,3

60
New cards

A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?

  1. botnet
  2. spyware
  3. virus
  4. rootkit

1

61
New cards

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns .
If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?

  1. permitted
  2. denied

2

62
New cards

What QoS step must occur before packets can be marked?

  1. classifying
  2. shaping
  3. queuing
  4. policing

1

63
New cards

What is the main function of a hypervisor?

  1. It is used to create and manage multiple VM instances on a host machine.
  2. It is a device that filters and checks security credentials.
  3. It is a device that synchronizes a group of sensors.
  4. It is software used to coordinate and prepare data for analysis.
  5. It is used by ISPs to monitor cloud computing resources.

1

64
New cards

A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended?

  1. Frame Relay
  2. Ethernet WAN
  3. VSAT
  4. ISDN

2

65
New cards

An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 10.1.3.8 eq dns .
If a packet with a source address of 10.1.3.8, a destination address of 10.10.3.8, and a protocol of 53 is received on the interface, is the packet permitted or denied?

  1. denied
  2. permitted

1

66
New cards

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

  1. 12
  2. 4
  3. 8
  4. 16
  5. 6

3

67
New cards

Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?

  1. a less-structured approach based on an educated guess
  2. an approach comparing working and nonworking components to spot significant differences
  3. a structured approach starting with the physical layer and moving up through the layers of the OSI model until the cause of the problem is identified
  4. an approach that starts with the end-user applications and moves down through the layers of the OSI model until the cause of the problem has been identified

1

68
New cards

Why is QoS an important issue in a converged network that combines voice, video, and data communications?

  1. Data communications must be given the first priority.
  2. Voice and video communications are more sensitive to latency.
  3. Legacy equipment is unable to transmit voice and video without QoS.
  4. Data communications are sensitive to jitter.

2

69
New cards

Which statement describes a VPN?

  1. VPNs use logical connections to create public networks through the Internet.
  2. VPNs use open source virtualization software to create the tunnel through the Internet.
  3. VPNs use dedicated physical connections to transfer data between remote users.
  4. VPNs use virtual connections to create a private network through a public network

4

70
New cards

In which OSPF state is the DR/BDR election conducted?

  1. ExStart
  2. Init
  3. Two-Way
  4. Exchange

3

71
New cards

Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?

  1. Cisco Secure Mobility Clientless SSL VPN
  2. Frame Relay
  3. remote access VPN using IPsec
  4. Cisco AnyConnect Secure Mobility Client with SSL
  5. site-to-site VPN

5

72
New cards

What is the final operational state that will form between an OSPF DR and a DROTHER once the routers reach convergence?

  1. loading
  2. established
  3. full
  4. two-way

3

73
New cards

Which type of server would be used to keep a historical record of messages from monitored network devices?

  1. DNS
  2. print
  3. DHCP
  4. syslog
  5. authentication

4

74
New cards

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)

  1. packet addressing
  2. delay
  3. jitter
  4. packet routing
  5. link speed

2,3

75
New cards

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

  1. Determine ownership.
  2. Determine the symptoms.
  3. Narrow the scope.
  4. Document the symptoms.
  5. Gather information.

3

76
New cards

What protocol sends periodic advertisements between connected Cisco devices in order to learn device name, IOS version, and the number and type of interfaces?

  1. CDP
  2. SNMP
  3. NTP
  4. LLDP

1

77
New cards

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.0.0.127
  2. 0.0.0.31
  3. 0.0.3.255
  4. 0.0.0.63

3

78
New cards

Which type of OSPFv2 packet is used to forward OSPF link change information?

  1. link-state acknowledgment
  2. link-state update
  3. hello
  4. database description

2

79
New cards

What protocol synchronizes with a private master clock or with a publicly available server on the internet?

  1. MPLS
  2. CBWFQ
  3. TFTP
  4. NTP

4

80
New cards

Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?

  1. dynamic multipoint VPN
  2. SSL VPN
  3. IPsec virtual tunnel interface
  4. GRE over IPsec

4

81
New cards

An OSPF router has three directly connected networks; 10.0.0.0/16, 10.1.0.0/16, and 10.2.0.0/16. Which OSPF network command would advertise only the 10.1.0.0 network to neighbors?

  1. router(config-router)# network 10.1.0.0 0.0.255.255 area 0
  2. router(config-router)# network 10.1.0.0 0.0.15.255 area 0
  3. router(config-router)# network 10.1.0.0 255.255.255.0 area 0
  4. router(config-router)# network 10.1.0.0 0.0.0.0 area 0

1

82
New cards

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.0.7.255
  2. 0.0.1.255
  3. 0.0.3.255
  4. 0.0.15.255

2

83
New cards

How does virtualization help with disaster recovery within a data center?

  1. improvement of business practices
  2. supply of consistent air flow
  3. support of live migration
  4. guarantee of power

3

84
New cards

How does virtualization help with disaster recovery within a data center?

  1. Less energy is consumed.
  2. Server provisioning is faster.
  3. Hardware at the recovery site does not have to be identical to production equipment.
  4. Power is always provided.

3

85
New cards

How does virtualization help with disaster recovery within a data center

  1. Hardware does not have to be identical.
  2. Power is always provided.
  3. Less energy is consumed.
  4. Server provisioning is faster.

1

86
New cards

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

  1. access-list 103 deny tcp host 192.168.10.0 any eq 23
    access-list 103 permit tcp host 192.168.10.1 eq 80
  2. access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80
    access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
  3. access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80
    access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23
  4. access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1
    access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet

2

87
New cards

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

  1. executing the SPF algorithm
  2. building the topology table
  3. selecting the router ID
  4. declaring a neighbor to be inaccessible

2

88
New cards

What protocol uses agents, that reside on managed devices, to collect and store information about the device and its operation?

  1. SYSLOG
  2. TFTP
  3. CBWFQ
  4. SNMP

4

89
New cards

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 10.27.27.0 255.255.255.0. What wildcard mask would the administrator use in the OSPF network statement?

  1. 0.0.0.63
  2. 0.0.0.255
  3. 0.0.0.31
  4. 0.0.0.15

2

90
New cards

When will an OSPF-enabled router transition from the Down state to the Init state?

  1. when an OSPF-enabled interface becomes active
  2. as soon as the router starts
  3. when the router receives a hello packet from a neighbor router
  4. as soon as the DR/BDR election process is complete

1

91
New cards

What type of traffic is described as having a high volume of data per packet?

  1. data
  2. video
  3. voice

2

92
New cards

What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?

  1. LLDP
  2. NTP
  3. TFTP
  4. SNMP

1

93
New cards

Which step in the link-state routing process is described by a router running an algorithm to determine the best path to each destination?

  1. building the topology table
  2. selecting the router ID
  3. declaring a neighbor to be inaccessible
  4. executing the SPF algorithm

4

94
New cards

Which type of VPN connects using the Transport Layer Security (TLS) feature?

  1. SSL VPN
  2. IPsec virtual tunnel interface
  3. GRE over IPsec
  4. dynamic multipoint VPN

1

95
New cards

Which group of APIs are used by an SDN controller to communicate with various applications?

  1. eastbound APIs
  2. westbound APIs
  3. northbound APIs
  4. southbound APIs

3

96
New cards

A company has consolidated a number of servers and it is looking for a program or firmware to create and control virtual machines which have access to all the hardware of the consolidated servers. What service or technology would support this requirement?

  1. Cisco ACI
  2. software defined networking
  3. Type-1 hypervisor
  4. APIC-EM

3

97
New cards

What command would be used as part of configuring NAT or PAT to identify inside local addresses that are to be translated?

  1. ip nat inside source list 24 interface serial 0/1/0 overload
  2. ip nat inside source list 14 pool POOL-STAT overload
  3. access-list 10 permit 172.19.89.0 0.0.0.255
  4. ip nat inside source list ACCTNG pool POOL-STAT

3

98
New cards

Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting, what service or technology would support requirement?

  1. Cloud services
  2. Data center
  3. APIC-EM
  4. Cisco ACI

1

99
New cards

Which three types of VPNs are examples of enterprise-managed site-to-site VPNs? (Choose three.)

  1. Layer 3 MPLS VPN
  2. IPsec VPN
  3. Cisco Dynamic Multipoint VPN
  4. GRE over IPsec VPN
  5. clientless SSL VPN
  6. client-based IPsec VPN

2,3,4

100
New cards

In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.)

  1. It can be viewed by using the show ip ospf database command.
  2. A neighbor table is created based on the LSDB.
  3. It contains a list of only the best routes to a particular network.
  4. It contains a list of all neighbor routers to which a router has established bidirectional communication.
  5. All routers within an area have an identical link-state database.

1,5