CCENT Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Looking at the download, what key:value pair option has a value that is numeric in nature?

"lastUpdateTime": 1572317520439

__________ means that the QoS tool changes one or more header fields, setting a value in the header.

Marking

The exhibit shows a simple internetwork in which all the LAN connections use FastEthernet. Select the answers that list the correct cable types. Exhibit

-A rollover cable between R1 and host F -An Ethernet crossover cable between SW3 and Hub1

Which of the following methods can you use to connect to an autonomous AP for management purposes?

All of these

Which of the answers list a configuration step on a Cisco access switch to support IP routing using only SVIs?

-Each routed physical interface must be configured with an IP address. -Each VLAN interface must be configured with an IP address. -The switch is enabled for IP routing.

Which two of the following actions provide the best security for accessing a router's privileged mode remotely?

-Enabling SSH and disabling Telnet access using the transport input ssh VTY line subcommand -Configuring the enable secret command

Which of the following rules does an OSPF router follow with regard to the selection of a router ID when the OSPF process starts?

-In the absence of a specified router ID, the highest IP on a loopback is used. -The highest IP on a nonloopback interface is the last choice for use as a router ID in OSPF. -An administratively configured router ID is used as the first choice.

The exhibit shows an internetwork, with IP addresses and default gateways for some devices. The addresses have been configured on the routers, and the PCs have been configured using the same subnet masks as the routers on the LANs. A routing protocol has been enabled, and both routers have learned all routes known by the other router. Which of the following statements are true about the behavior of IP in this network?

-PC1 is in a different subnet than R1's LAN interface. -PC3 should not be able to ping PC1.

Which options are actions of the management plane of a networking device?

-The configuration of a device via its VTY ports -The alert of an error occurring on an interface

Which of the following are designed to provide wireless encryption by using the AES algorithm? Each correct answer represents a complete solution. Choose all that apply.

GCMP CCMP

What is correct about the state of the shown capabilities in this exhibit? Exhibit

-R1 is capable of running routing, switching, and IGMP. -R1 can only ever have the capabilities of a router, switch, and IGMP. -SW1 is capable of running switching and IGMP.

Assuming all default STP settings, which of SW3's ports will become its root port, and what will its root cost be? Exhibit

Gi0/1, 8

In the exhibit, in VLAN 1, all switches have default STP settings, and all trunks are up and running at 100 Mbps. Which statements are true regarding the behavior of STP in this network, for VLAN 1, after the STP topology has stabilized? Exhibit

-SW3's Fa0/1 interface will be in a forwarding state. -SW1 will create Hello messages regularly based on its Hello timer.

Suppose several APs are deployed in a cloud-based architecture. Which of the following are correct statements about the control and data planes involved in the wireless network?

-The data plane extends from the wireless users to the cloud-base AP. -The control plane extends from the APs to the internet cloud, where the APs are managed.

Refer to the download and exhibit; an engineer is checking the work of a co-worker who is responsible for developing the ROAS configuration of R1. Which options are true of the potential configuration of R1? Exhibit

-The physical interface has a command that is invalid. -The interfaces handling the VLAN 30 and 40 traffic have their assignment commands reversed.

The exhibit shows a typical use of NAT and PAT, in which a router (R1) translates addresses from packets flowing between the Enterprise network on the left and the Internet on the right. Consider a packet sent by PC1 toward the web server, while the packet passes the LAN to the left of router R1. Which of the following statements are true about this packet and the network in general? Exhibit

-The address assigned to PC1 should be a private IP address. -The packet's destination address should be a public IP address. -The packet's source address is considered an inside local address.

In the exhibit, CAT5 cabling with RJ-45 connectors is used. Which of the following statements are true about the wires inside the cable and the RJ-45 pins to which they are connected? Exhibit

-The cable from R1's console to PC3's serial port connects pin 8 on one end to pin 1 on the other. -The cable from PC1 to SW1 connects pin 6 on one end to pin 6 on the other.

The network in the exhibit uses CAT5 cabling with RJ-45 connectors. Which of the following statements are true about the wires inside the cable and the RJ-45 pins to which they are connected?

-The cable from SW2 to R1 connects pin 6 on one end to pin 6 on the other. -The cable from SW1 to SW2 connects pin 6 on one end to pin 2 on the other.

What are some valid benefits of configuration provisioning when utilizing a configuration management system?

-The capability to leverage variables and advance logic with templates to configure multiple devices with similar roles -The capability to revert changes if needed

Two switches are connected by four Fast Ethernet trunks. Four VLANs exist, with members of each VLAN on each of the two switches. The network engineer would like to have the switches treat all four trunks as a single 400 Mbps trunk, with some of the traffic being forwarded over each of the links between the switches. Which of the following statements are true of such a configuration?

-The four trunks can be placed into the same EtherChannel to achieve this goal. -The show spanning-tree command will list the combined four links with an abbreviation of Po for PortChannel.

Refer to the exhibit. Host B issues a ping command to ping host D's IP address. The ping command succeeds. Which of the following statements are true regarding the ICMP echo request messages sent by host B?

-The frame holding the packet as it crosses the cable between SW3 and Hub1 has a MAC address on R2 as the source MAC address. -The frame holding the packet as it crosses the cable between SW1 and R1 has a destination MAC address of a MAC address on R1.

In the exhibit, all devices are statically configured with the IP addresses, masks, and default gateway information. Assume that all switches have learned the MAC addresses of all devices in the exhibit. PC1 pings PC4 and PC1 receives replies, confirming that the ping worked. Which of the following are true about the frames sent in this network, and their encapsulated packets?

-The frame that contains the ICMP Echo request, sent by PC1, has a destination MAC address of R1's Fa0/0 interface's MAC. -The frame that contains the ICMP Echo request, sent by PC1, has a destination IP address of 10.1.2.4.

Router R1 in the exhibit needs to be configured for dynamic NAT, reserving public IP addresses 192.31.7.129 through 192.31.7.144 as a dynamic NAT pool for hosts in the 10.1.1.0/24 private IP subnet. Which of the following commands would be useful as part of the NAT configuration on R1? Exhibit

-The ip nat outside interface subcommand under interface S0/0 -An access list that includes the single command access-list 1 permit 10.1.1.0 0.0.0.255

When referencing MPLS VPN Layer 3 configurations, which of the following statements are true?

-The provider uses MPBGP to transport customer routes. -The CE router becomes a routing protocol neighbor with the PE.

The SDA underlay uses a well-known design called a routed access layer design. What are the features of a routed access layer design?

-The switch to which an endpoint device physically connects is that device's default gateway. -FHRP is no longer needed.

What are some perceived benefits of controller-based networks as compared to traditional networks?

-The use of DevOps approaches in the network to increase efficiency and productivity -The use of APIs to mass-configure network devices, allowing for more consistency and fewer errors

Which part of the following URI is the path?https://DNAC.example.com/dna/intent/api/v1/interface/network-device/1/1/5

/dna/intent/api/v1/interface/network-device

Which option would be the correct wildcard mask to match a subnet with the 255.255.248.0 subnet mask?

0.0.7.255

In the absence of a direct cost being configured for an OSPF interface, and using the default reference OSPF bandwidth, what is the OSPF cost for a Fast Ethernet interface operating at 100 Mbps?

1

Refer to the download and exhibit; an engineer is tasked with designing and configuring an ACL based on the following requirements. Which of the configurations listed in the download would correctly configure R1 inbound on interface G0/1? ->Deny HTTP traffic from hosts A and B to servers in LAN B. ->Deny FTP traffic from hosts C and D to servers in LAN B. ->Permit SMTP traffic from hosts B and C to servers in LAN B. ->Deny all other SMTP traffic to servers. ->Permit Telnet traffic from hosts A and D to server host E. ->Deny all other Telnet traffic to server host E. ->Permit all other traffic.

1

Refer to the exhibit. Assuming autonegotiation is enabled, what would be the resulting speed and duplex of the link between the switch and Host B?

100, Full

IPv6 represents a binary IPv6 address using hex characters. Which of the following binary strings represent C E?

1100 1110

Refer to the download; which addresses would be allowed?

192.168.1.145 10.10.10.100

From the following spoofing attacks, which option(s) leverages an application, device, or service to increase the amount of traffic being sent toward a target?

Amplification

Consider two consecutive REST API calls from a client to a server. Which answer best describes the fact that REST is stateless?

Both REST API calls from the client must include all necessary data along with that one API call.

Which type of memory does a switch use to build the MAC address table?

CAM

Refer to the diagram; which option is the term used to reference the devices indicated with a green arrow?

CE

What commands would you need to configure to enable DHCP Snooping so that PC3 can never become a rogue DHCP server within this network? Exhibit

Configure the following on SW 2: ip dhcp snooping ip dhcp snooping vlan 20 interface Gi0/12 ip dhcp snooping trust

Which spanning-tree modes are IEEE standards?

MSTP RSTP STP

What feature is being shown in this exhibit? Exhibit

DAI

Which of the four messages used by DHCP is sent by the client to look for a DHCP server?

Discover

Which of these ports does a WLC typically use to forward user traffic?

Distribution system port

Which MEF-defined Metro Ethernet service acts similarly to a local LAN?

E-LAN

What are the two ICMP messages used by the ping command?

Echo request and echo reply

What is the name of the Cisco IOS CLI exec mode that allows a user to run more powerful commands?

Enable mode

What features did SNMPv3 replace communities with?

Encryption Authentication Message integrity

Refer to the exhibit; based on this configuration, what would be the assigned link local address? Exhibit

FE80::200:5BFF:FE2D:3A

Which is an unsolicited message from an SNMP agent that requires an acknowledgment from a Network Management Station (NMS)?

Inform

Examine the output shown in the download. What is true about the number 1 shown in brackets?

It is the administrative distance.

What are the common LAN Layer 1 problem indicators?

Late collisions Collisions

Examine the output of the show ipv6 interface brief command shown in the download. What two address types are shown?

Link-local Unique local

What is the name of the Cisco virtualization offering that can be used to completely replace the functionality of the VMware vSwitch?

Nexus 1000v

Host A, in one Ethernet VLAN, needs to communicate using IPv6 to host B, which is in another Ethernet VLAN. Which answer best describes the protocol used by host A to learn the layer 2 address of host B?

No protocol is used; A does not learn B's MAC address.

When using DNA Center, what is it called when you are leveraging the REST API or the GUI interface of DNA Center?

Northbound APIs

The size of a subnet is calculated with the formula 2 raised to the H minus 2. Why are two hosts subtracted from this possible size?

One host address is reserved for the subnet number, and the other is reserved for the subnet broadcast address.

Multifactor authentication can use things that you know, things you have, and things you are. From the authentication alternatives in the answers, which include something you must know?

Passwords

Which cloud service is specific to one company that owns both the tools/infrastructure that creates the cloud and the people that use the services?

Private cloud

An engineer is tasked with figuring out why multiple trouble tickets have been logged by users who are unable to connect to their internal resources during high-demand daytime hours. The engineer logs into the users' common router and finds that it has been configured with LLQ. What could be causing this problem?

Queue starvation.

What commands will configure an OSFP point-to-point network type?

R1(config)# interface fa0/1 R1(config-if)# ip ospf network point-to-point

Refer to the download and exhibit; note that the download has two sections, labeled section 1 and section 2. What is the cause of the command failure shown in section 2 of the download? Exhibit

R3 is not advertising the 172.16.3.0/24 network.

How does a wireless network advertise itself to devices so that they can join the network?

SSID

Which of the following VPN features provides encryption and authentication services, but only for applications accessible from the user's web browser?

SSL

Which security function would be the best option to mitigate a DoS attack?

Stateful firewall

What is the name of the firewall feature that, when used, can maintain a historical database of each connection through a device: where it was sourced, destined, and which protocol and protocol port it was using?

Stateful inspection

Which type of encryption should be avoided when encrypting data in a wireless environment?

TKIP

The download shows the output of the show ip interface brief command on router R1. All the interfaces listed in the download should work under normal conditions and have worked in the past. Which of the following is the most likely condition that would cause the output shown in the exhibit?

The router on the other end of R1's S0/1/0 interface has been configured to use PPP, but R1 still defaults to using HDLC.

A switch implements both DHCP Snooping as well as Dynamic ARP Inspection (DAI) using ARP ACLs. DHCP Snooping reacted when host A leased an address with DHCP so that the switch now has a valid binding table entry for host A. However, the configured ARP ACL rule denies host A's MAC address. What happens when host A sends ARP messages that need to pass through the switch?

The valid ARP message is discarded by the ARP ACL.

What statement is true about the command ipv6 unicast-routing?

This command is required for the operation of IPv6 routing on the device.

The term segment refers to which layer PDU?

Transport layer PDU

The different PoE standards all utilize a different number of wire pairs to send power to the end device. Of the following standards, which use four wire pairs to send power?

UPoE UPoE+

When thinking about the configuration of network devices, if you want to know what changed when it changed, and/or who changed it, what should you implement?

Version control

Which command will generate the SSH encryption keys?

crypto key generate rsa

Which command would you issue if you wanted to see the configured values for IP address, subnet mask, default gateway, and DNS servers on a Windows device?

ipconfig /all

Which Cisco IOS command is used to display all the known LLDP neighbors?

show lldp neighbors

Select the terms about LAN and WAN topology from the lists.

star full mesh partial mesh hybrid

What is the proper configuration sequence to enable port security on SW2 on port Gi0/1 so that only the first three clients connected to this port are allowed? In addition, if any other clients connect to this port, the port must stay active and a logging message must be generated.

switchport mode access switchport port-security switchport port-security maximum 3 switchport port-security violation restrict switchport port-security mac-address sticky firewall

Refer to the exhibit; which of the following connection parameters are used when connecting to the console of a Cisco switch?

9600, none, 8, 1

What value is used in an IPv6 route that indicates all traffic and is used in default routes?

::/0

The exhibit shows an internetwork, with IP addresses and default gateways for some devices. The addresses have been configured on the routers, and the PCs have been configured using the same subnet masks as the routers on the LANs. A routing protocol has been enabled, and both routers have learned all routes known by the other router. Which of the following statements is true about the behavior of IP in this network?

A new PC added to the R1 LAN could be assigned IP address 10.4.4.255/23, default gateway 10.4.4.200, and be able to ping PC3.

What is true about leased lines?

All of these are correct.

A customer support rep at the help desk is working on a problem. The problem record mentions address 172.16.1.1 and masks 255.255.254.0. At a lunch-and-learn session yesterday, the rep heard the network engineering team say that they avoided VLSM, and used only a single subnet mask in network 172.16.0.0. Which of the following answers are accurate regarding this implementation of network 172.16.0.0 and its subnetting plan?

-Each subnet supports 510 hosts. -The network supports up to 128 subnets.

The switches use the settings implied by the output in the download, or if not shown, they each use the default of dynamic auto. Which answers are correct about the operational trunking state of interfaces in this LAN, both now and if changes are made as listed in some answers? Exhibit

-The link between SW2 and SW4 will not trunk. -SW1's Fa0/2 interface trunks as long as the interface trunking mode is not changed to access.

When planning a greenfield SDA design, what traditional LAN design points should be included?

-The number of switchports needed in each switch -The required speed of the switchports

Which of the following IP address/mask combinations, if configured on a working router interface, would create a connected route for an entire classful network, instead of a route for a subnet of a classful network?

172.16.1.1/16 192.168.1.1/24

If subnetting class B network 172.18.0.0 using subnet mask 255.255.240.0 for all subnets, which answers list an address in the second subnet?

172.18.16.10 172.18.31.200

If subnetting network 192.224.10.0 with mask /29 for all subnets, what is the subnet broadcast address of the fifth subnet?

192.224.10.39

Given the output from a working OSPF router, as seen in the download, how many neighboring routers exist?

2

Which of the following IP addresses could be assigned to a host?

207.87.255.133/28

OSPF-enabled routers send "Hello" packets using which multicast IP address?

224.0.0.5

Review the topology diagram given in the exhibit. All the Ethernet links have been manually assigned an OSPF cost of 4. Each end of the serial link that connects R3 and R4 has been set to an OSPF cost of 15. The entire private network has been configured as a single OSPF area. What is the cost from R1's routing table to reach the network 10.45.0.0/24?

23

Refer to the download. What is the subnet mask of the LAN directly connected to R1?

255.255.255.0

Based on the exhibit, host A sends a packet to server B. The two serial links use HDLC, while the rest are Ethernet. How many times does a router re-encapsulate the original IP packet into a new data link frame?

5

Which ports are ephemeral ports?

51974 61943

If your ISP assigns you prefix 2003:1234:abcd:6600:: /56, how many bits do you have to create your subnets? Exhibit

8 bits

Refer to the download and exhibit; the download shows the current contents of PC1's DNS cache and ARP cache. The user next opens a web browser to connect to URL www.ciscopress.com. Which of the following accurately describes the next packet sent by PC1? Exhibit

An ARP request looking for the MAC address associated with 10.1.1.3 (R1)

What does CAPWAP mean?

Control and Provisioning of Wireless Access Points

What mode of communication is used when only one device can successfully transmit on a channel at a time?

Half duplex

You are the administrator of the network pictured in the exhibit. The download shows the configuration for router A that a colleague has proposed. The goal of the configuration is to use PAT, translating addresses for hosts on router A's LAN, with a single global IP address from the serial 0 interface. Which of the following answers best describes what you must change for your colleague's configuration to correctly implement PAT?

Reverse the location of the ip nat inside and ip nat outside commands.

Migrating your on-premise email capability to a cloud-hosted email service offering is an example of what as a service model?

SaaS

Refer to the exhibit; you have been tasked to help implement security measures for your company, which is going to place a number of public access computer terminals in its retail locations. Part of this process is securing the Ethernet ports that will be used by these terminals; this will be done by implementing Cisco's port security feature on SW2 and SW3. Your boss wants to make sure that the ports are forced into a disabled state if another device is plugged into them. In this case, which port security violation mode should be configured on these ports?

Shutdown

In a controller-based network architecture, what is the name of the interface that is used to communicate between the controller and the deployed network devices?

Southbound interface

Refer to the exhibit and download; to make it possible for all traffic to pass between PC1's LAN and PC2's LAN, the link between SW1 and SW2 will be configured as a trunk. Which Cisco IOS command could be used on SW1's Gi0/1 interface to force it to actively attempt to trunk with SW2? Exhibit

switchport mode dynamic desirable


Conjuntos de estudio relacionados

Mythology and Folklore Units 1-4

View Set

SDSU Anthropology 101 Inquisitive Chapter 10

View Set

ATI NCLEX Fundamentals Assessment 1

View Set