ist 203

¡Supera tus tareas y exámenes ahora con Quizwiz!

How many internal hosts can be translated to one external IP address using Port Address Translation?

65,536

how many internal hosts can be translated to one external ip address using port address translation?

65,536

which tcp port number is used for HTTP (non-secure web traffic)?

80

what is REST and HTTP equivalent of the Read term in CRUD?

GET

Which FHRP solution provides the ability to implement an active/active redundancy approach?

GLBP

the nms uses ___ messages to ask for information from an agent, and then the nms sends an snmp ___ message to write the variables on the snmp agent in order to change the device's configuration

Get, Set

many rest-based apis use the ___ protocol

HTTP

which of these sdn types does not directly program the data or control plane, but can indirectly affect them via telnet, ssh, and/or snmp?

OpFlex

which method of wireless authentication leverages a digital certificate on the as as a robust method to authenticate the radius server?

PEAP

which of these protocols uses TCP?

POP3

In what type of network does the wireless AP act autonomously, rather than with a Cisco Wireless LAN Controller (WLC)?

SOHO

________ provides a VM where the customer receives an offering with working software where the provider has complete control over how the offering is provided but the customer has control over how the offering is used

SaaS

With what type of traffic do jitter and delay not matter much?

batch

with what type of traffic do jitter and delay not matter much?

batch

when should you disable the ACL's on the interfaces?

before you change a statement

where can cisco routers apply acl logic to packets?

both

which management system can perform a discovery process to find all devices and then build a topology map?

both PI and DNA center

traditionally, most networks have been designed to utilize a(n) ___ control plane

bridged?

which of the following describes an IBSS?

a network in which two or more wireless devices connect to each other directly, with no other means of network connectivity

when is a manual per-device configuration plan the best choice?

a single person managing a single device

which of the following topologies is a design in which one central device connects to several others?

a star topology?

What is REST?

a type of api

Which of these are characteristics of Internet VPN?

all but QoS

when a port security violation occurs, what happens next by default?

all future incoming traffic on that port is discarded from the violating mac address

what is the paid server version of Ansible called?

ansible tower

the ___ is the controller that creates application policies for the data center infrastructure

apic

what is the name of the centralized controlled that is used by cisco's application centric infrastructure?

apic

where should standard acls be placed?

as close as possible to the destination of the packet

where should extended acls be placed?

as close as possible to the source of the packet

when referring to wireless networks, membership in a bss is known as which of the following?

association

Which is not one of the security features provided by SNMP version 3?

authorization

how does a switch know how much power to deliver to a PoE device?

auto negoiation

How does a switch know how much power to deliver to a PoE device?

autonegotiation

which of the following types of access points are equipped with both wired and wireless hardware so that the wireless client associations can be terminated on wired connection locally at the AP?

autonomous AP

which sda component is the network of decies and connections that provide ip connectivit to all nodes?

underlay

which of these are attributes of REST?

uniform interface layered Stateless operation code-on-demand

Which term is not a synonym for a VPN encryption key?

unique key

which term is not a synonym for a vpn encryption key?

unique key

the ___ protocol is most often used to transfer web pages

http

In server virtualization, a host is defined as what component?

hypervisor

The ________ manages and allocates the host hardware (CPU, RAM, and so on) to each VM based on the settings configured

hypervisor

the ___ manages and allocates the host hardware (cpu, ram, and so on) to each vm based on the settings configured

hypervisor

what does the command ip helper-address server-ip do?

identifies the dhcp server by its ip address

which standard must wireless devices adhere to?

ieee 802.11

which linux/mac os cli command is used to verify the ip address, mask, default router and other ip settings?

ifconfig

ansible's playbooks use a(n) ___ language, whereas puppet uses a(n) ___ language

imperative, declarative

what is the purpose of DHCP Snooping?

improve security

a version control system cannot help solve what problem?

individual engineers can still make manual changes, introducing errors

in ___-based networking, an engineer configures the outcome desired and then the devices determine what configuration and behavior are necessary to achieve that outcome

intent

A(n) ________ exchange has come to be known as a company that creates a private network as a service.

intercloud

Which public cloud WAN options do not allow for an easy migration between different cloud providers?

internet internet vpn intercloud

in the ip header, if you want to set the protocol type to "all ipv4 packets," what keyword do you use?

ip

which cisco ios command woul dbe used to apply acl number 10 outbound on an interface?

ip access-group 10 out

which cisco ios command would be used to apply ACL number 30 inbound on an interface?

ip access-group 30 in

what command enables DAI on a switch for specialized VLANS?

ip arp inspection vlan

what command enables dhcp snooping?

ip dhcp snooping

For static NAT, use what command to ensure that the inside local address is listed first and the inside global address second?

ip nat inside source static

for static nat, use what command to ensure that the inside local address is listed first and the inside global address second?

ip nat inside source static?

which option is not one of the required parameters that are matched with an extened ip acl?

ip option type

which of the following is a windows command for discovering a host's ip address?

ipconfig /all

Which type of encryption is commonly used to secure VPNs?

ipsec

which type of encryption is commonly used to secure vpns?

ipsec

what is rest's relationship to caching?

it has a clear method to determine whether a resource is cacheable or not

which of these is not an attribute of a gratuitous ARP message?

it is an ARP reply sent without having first received an ARP request Sent to the broadcast address for the subnet

how does HSRP support load balancing?

it prefers different routers to be the active router in different subnets

How does dynamic NAT identify which inside local IP addresses need to have their addresses translated?

it uses a ACL

what is the purpose of the LISP map server?

keeps the list of the EIDs and matching RLOCs

when the function of an autonomous AP are divided and the AP performs only real-time 802.11 operation, the AP is known as which of the following?

lightweight ap

when you configure port security, what restriction is imposed?

limit

the opendaylight project exists as a project of

linux foundation

what does the crud acronym stand for?

create, read, update, delete

the ___ command is the most frequently used within HTTP

get

What is the minimum bandwidth expected on a link to ensure a quality IP video connection?

384 kbps

which of the following return codes for HTTP requests means that the file could not be found?

404

TCP and UDP port numbers above ___ are not assigned. They are intended to be dynamically allocated and used temporarily for a client application

49151

cisco controllres suppor a maximum of ___ wlans, but only ___ of them can be actively configured on an ap

512, 16

what is the max data rate for the 802.1n standard?

600 mbps

which range of numebers is used to indicate that a standard acl is being configured?

1-99 1300-1999

Refer to the following figure. Based on the command shown in the figure, what are the IP address/NAT label combinations?

10.10.100.1, inside local 192.168.200.45, inside global

which ip address range would be matched by te access-list 20 permit 10.20.192.0 0.0.63.255?

10.20.192.0-10.20.255.255

Refer to the following figure. Based on the command shown in the figure, what are the IP address/NAT label combinations?

10.56.28.65, inside global 172.16.200.87, inside local

which range of numbers is used to indicate that an extended acl is being configured?

100-199 2000-2699

TCP and UDP port numbers below ___ are reserved for well-known applications

1024

Which Metro Ethernet IEEE Ethernet standard provides the greatest speed at a distance of 40 km?

10GBASE-ER

which metro ethernet ieee ethernet standard provides the greatest speed at a distance of 40 km?

10Gbase-ER

what is the maximum one-way delay expected on a link to ensure quality ip voice connection?

150

In the following diagram, what is the outside global IP address?

171.16.68.1

in the following diagram, what is the outside global ip address?

171.16.68.1 is outside

which options are not one of the ranges defined by rfc 1928?

172.16.0.0/16 192.168.0.0/24 10.0.0.0/16 ???

Which options are not one of the ranges defined by RFC 1918?

172.16.0.0/17 192.168.0.0/24 10.0.0.0/16

which ip address range would be matched by the access-list 30 deny 172.30.156.0 0.0.3.255?

172.30.156.0 - 172.30.159.255

which ip address range would be matched by the access-list 10 permit 192.168.100.128 0.0.0.15?

192.168.100.128 - 192.168.100.143

How many tiers does a collapsed-core design have?

2

a cisco embedded wcl deployment can typically support up to how many aps?

200

what is the address that sends the same message to all hosts on the local subnet?

255.255.255.255

what is the minimum bandwidth expected on a link to ensure a quality IP video connection?

384

Which of these is the best definition of a hybrid topology?

A combination of different design topologies form a large and typically more complex design

in what sense is a private cloud "private"?

A single company both owns the tools that create the cloud and employs the people who use the service

Which DiffServ DSCP assured forwarding value offers the worst queue and drop performance?

AF13

The ________ is the software that is run on a device that is going to be managed.

SNMP agent

access points all have a unique identifier based upon the mac addres of the access point. what is this unique identifier known as?

BSSID

________ defines rules that enable an ISP to assign public IP addresses in blocks rather than in whole classes (A, B, or C)

CIDR

A DSLAM is typically located in which location?

CO

What is Cisco's offering that allows customers to deploy their own virtual router inside a cloud provider's network?

CSR

Which DiffServ DSCP assured values were defined to be backward compatible with IPP priority values?

Class Selector

Which field is used in the 802.1Q header to mark a specific QoS value?

CoS

to match a subnet, use the subnet ID as the source, and find the WC mask by subtracting ___ from ___

DDN subnet mask 255.255.255.255

What is the name of the device that is used with a Digital Subscriber Line (DSL) to split the voice and data signals at the Telco?

DSLAM

Which of these is not one of the popular vendors or product family names associated with virtualized data centers?

Debian

Which MEF service type acts like a traditional Ethernet network?

E-LAN

which MEF service type acts like a traditional ethernet network?

E-Lan

Which MEF service type provides a link similar to a T1 leased line?

E-Line

Which option is not one of the three MEF service types?

E-Mesh

Which MEF service type uses a hub-and-spoke topology?

E-Tree

which of the following is a wireless authentication method, developed by cisco, in which authentication credentials are protected by passing a protected access credential (pac) between the AS and the supplicant?

EAP-FAST

which authentication method is considered the most secure wireless authentication method currently available?

EAP-TLS

Which DiffServ DSCP value is suggested to be used for voice calls?

EF

which diffserv dscp value is suggested to be used for voice calls?

EF

A Metro Ethernet ________ defines which user devices can communicate with each other.

EVC

a metro ethernet ___ defines which user devices can communicate with each other

EVC

which of these are advantages of storing configuration information in a central location?

Ease of backup No uncertainty about which configuration file should be used Multiple engineers can access them as needed

Which of these functions does a SOHO router typically include?

Ethernet switch wireless ap firewall

which of these are properties of site-to-site vpns?

Ipsec typically permanent

How does HSRP support load balancing?

It prefers different routers to be the active router in different subnets

When talking about NAT/PAT, which of the following statements best describes the term inside local address?

It refers to an IP address in an IP header, with that address representing a local host as the packet passes over the local enterprise network

how does JSON organize data?

Key:Value pairs

What is the purpose of CDP?

Learns about neighboring routers without needing to know their passwords

Which of the following algorithms is used to verify the integrity of an IOS file?

MD5

what is the name of the organization that defines the standards for metro ethernet?

MEF

The SNMP database is referred to as the ________

MIB

the snmp database is referred to as the ___

MIB

which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?

MIC

________ is an application layer protocol that provides a message format for communication between managers and agents

SNMP

The ________ feature is used to match packets for classification in a large variety of ways that are useful for QoS

NBAR

the ___ feature is used to match packets for classification in a large variety of ways that are useful for QoS

NBAR

Which organization has defined the five different criteria for cloud computing services?

NIST

which organization has defined the five different criteria for cloud computing services?

NIST

Which of the following types does the IOS file system use as the default location of the startup-config file?

NVRAM

which actions can be chosen when configuring an ACL?

Permit Deny

Which of the following steps should be done to upgrade an IOS image into flash memory after the IOS image is obtained from Cisco?

Place the IOS image in a location the router can reach

What is the name of the Metro Ethernet providers facility that is located as close to their customers as possible?

PoP

on what configuration page of the cisco wlc would you be able to configure a wi-fi multimedia (wmm) policy?

QoS

the wired equivalent privacy (wep) uses which encryption algorithm to encrypt data?

RC4

Which RFC specifies IP address allocation for private internets?

RFC 1918

what does the DHCP server needs to know to support DHCP clients?

Subnet ID and Mask Reserved (excluded) addresses Default router(s) DNS IP address(es)

___ provides for retransmission and helps to avoid congestion, whereas ___ does not.

TCP, UDP

Which field is used in the 802.11 header to mark a specific QoS value?

TID

which field is used in the 802.11 header to mark a specific QoS value?

TID

Often virtualization hosts placed into a data center rack will be cabled to two different switches. These switches are referred to as ________

ToR

which field is used within the IPV6 packet header for QoS markings?

Traffic class

which protocol and port number are used for Syslog traffic?

UDP, 514

Which of the following PoE standards requires four powered wire pairs?

UPoE UPoE+

the address entered into a web browser (firefox, safari, chrome) is technically called a ___

URI

what does REST use to identify what source the request acts on?

URI

What is another common term that is used to describe what the MEF calls E-LAN services?

VPLS

What is another common term that is used to describe what the MEF calls E-Line services?

VPWS

Which FHRP available for configuration on Cisco devices is not proprietary?

VRRP

Which versions of SNMP rely on community strings, which are used to authenticate access to MIB objects?

Version 1 Version 2c

what command should you use to save the configuration of the sticky addresses?

copy running-config startup-config

Refer to the figure. Does a single point of failure exist in the topology shown? If so, where?

Yes, between SW2 and R2

which of these is the best definition of a hybrid topology?

a combination of different designs topologies form a large and typically more complex design

When using the Cisco campus design terminology, which layer provides a connection point for end-user devices?

access

when using the cisco campus design terminology, which layer provides a connection point for end-user devices?

access

which cisco ios statement would deny all traffic?

access-list 1 deny any

if you wanted to permit the source address 1.2.3.4, how would it be entered into the router's configuration files?

access-list 1 permit 1.2.3.4

which cisco ios statement would correctly match only the ip range from 10.10.10.0 through 10.10.10.127?

access-list 1 permit 10.10.10.0 0.0.0.127

which cisco IOS statement would correctly match only the ip range from 172.30.64.0 through 172.30.127.255?

access-list 1 permit 172.30.64.0 0.0.63.255

which cisco ios statement would match all traffic?

access-list 1 permit any

which cisco ios command would configure an extended ip acl statement that denies all http traffic from the 10.10.20.128/25 network to the 172.17.1.0/24 network?

access-list 101 deny tcp 10.10.20.128 0.0.0.127 172.17.1.0 0.0.0.255 eq ww

which cisco IOS extended ACL statement would correctly match all IPV4 traffic?

access-list 101 permit ip any any

which cisco ios command would configure an extended ip acl statement that permits all tftp traffic from the 192.168.1.0/26 network to the 10.2.3.192/27 network?

access-list 101 permit udp 192.168.1.0 0.0.0.63 10.2.3.192 0.0.0.31 eq 69

which cisco ios command can be used to document the use of a specific acl?

access-list acl-number remark

which WLC port is an asynchronous connection to a terminal emulator that can be used for out-of-band management, system recover, and initial boot functions?

console port

the ___ handles any action that controls the data plane

control plane

which one of the following is the data encryption and integrity method used by wpa2?

ccmp

___ defines rules that enable an isp to assign public ip addresses in block rather than in while classes (a, b, or c)

cidr

Which term refers to the process of matching the fields in a message to make a choice to take some QoS action?

classification

which term refers to the process of matching the fields in a message to make a choice to take some QoS action?

classification

what type of device uses the DHCP RELEASE and DHCP DECLINE messages?

client

in an HTTP request/reply action, ___ sends the request and ___ answers back

client server

in a scenario using 802.1.x and eap-based authentication, the term supplicant refers to which of the following?

client device requesting access

with both puppet and chef, in production you would run them as a ____ with multiple ___ workstations used by the engineering staff to build file stored on the ___

client, server, client

A(n) ________ exists for use as a web application that lists anything that can be required via the company's cloud infrastructure

cloud service catalog

a(n) ___ exists for use as a web application that lists anything that can be required via the company's cloud infrastructure

cloud services catalog

dhcp snooping verifies the mac address by doing what?

comparing the mac address in the ethernet header to that of the dhcp header

inconsistency in procedure implementation between network engineers in an enterprise can lead to what?

configuration drift

___ can monitor device configurations to discover when the differ from the intended ideal, and then either reconfigure the device or notify someone to make the change

configuration enforcement

___ refers to how to deploy changes to the configuration once made by changing files in the configuration management system

configuration provisioning

the ___ refers to the tasks that a networking device does to forward a message

data plane

what is the nsame of the field that is used for QoS markings in the ip header?

dcsp

What command is used to debug Network Address Translation by causing the router to issue a message every time a packet has its address translated for NAT?

debug ip nat

what is the default action taken on all unmatched traffic through an ACL?

deny

when a client receives several packets, each for a different application, how does the client os know which application to direct a particular packet to?

destination port number

which dhcp messages do clients typically send?

discover and request

In a two-tier network, which are most likely to connect directly to one another?

distribution device to distribution device

the ieee 802.11 standard refrs to the upstream wired ethernet as the ___ for the wireless BSS

distribution system

the wlc port that is used for all normal ap and management traffic, and usually connects to a swtich port in 802.1q trunk mode is known as what?

distribution system port

in a two-tier network, which are most likely to connect directly to one another?

distribution to distribution

What is a primary benefit of a three-tier network design over a two-tier design?

do not need full mesh

the term ___ generically refers to any protocol's packets that is sent by encapsulating a packet inside another packet

tunnel

what is one reason why using traditional manual configuration tools can create problems for an enterprise?

does not track change history

which cisco ios access-list command application keywords would be used to match DNS traffic?

domain

when connecting a vlan to a wlan, which interface is used?

dynamic interface

where should more specific statements be placed in the acl?

early in the acl

what functionality does the command ip helper-address server-ip enable in a network?

enables a network to have a single, centralized DHCP server

when the no service password-encryption command is issued to stop password encryption, which of the following describes the process for decrypting passwords?

encrypted passwords are decrypted only when the password is changed

which of these functions does a SOHO router typically include?

ethrnet switch wireless access point firewall

what is the term used to describe when access points are placed at multiple geographical locations and interconnected by a switched infrastructure?

extended service set

which is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?

extensible authentication protocol

Which type of memory is used by Cisco IOS to store files?

flash memory

what are the two major roles of the cisco dna center?

functions as the controller in a network that uses SDA Network management platform for traditional (non-SDA network devices

what keyword would you add to the end of an access-list command to see messages and statistics about matches of that particular line of the acl?

log

Which global configuration command enables logging for console users?

logging console

which global configuration command enables logging for console users?

logging consoles

for telnet and ssh users, which of the following command will enable the ios to send log messages to all users?

logging monitor

Which of the following commands will set the logging monitor to record security events with a priority at or above 3?

logging monitor 3

which of the following commands is used in IOS to set message levels for syslog?

logging trap

which of these are characeristics of internet vpn?

make data private requires capacity planning eases migration to a new provider speeds initial installation

Which of these are characteristics of MPLS VPN?

makes data private supports QoS requires capacity planning

A(n) ___ attack enables an attacker to eavesdrop on data that passes from one machine to another

man-in-the-middle

what type of attack does dhcp snooping attempt to prevent?

man-in-the-middle

which of the following usually performs the management functions of many lightweight aps?

management functions are performed by the lightweight AP intself

which interface is used for normal management traffic, such as RADIUS user authentication, WLC-to-WLC communication, web-based and ssh sessions, as well as used to terminate CAPWAP tunnels between the controller and its AP?

management interface

with dhcp snooping, what happens to dhcp messages recieved on an untrusted port that would normally be sent by a client?

may be filtered if they appear to be part of an attack

Which of the following topologies is a design that interconnects each node to every other node in the set?

mesh topology

___ techniques are ways to counteract or prevent attacks

mitigation

spoofing is the technique of doing what?

modifying addresses in packets

which public cloud wan options do not allow for an easy migration between different cloud providers?

mpls vpn ethernet wan

When CDP is used on Ethernet, it sends traffic using a(n) ________ address

multicast

when cdp is used on ethernet, it sends traffic using a(n) ___ address

multicast

a ddos attack occurs when ___

multiple machines are enlisted to carry out a dos attack

which cisco ios extended acl port number keyword would be used to not match a specific port number

ne

in the southbound APIs for DNA center, which protocols recent networking devices/software versions?

netconf restconf

Which of the following types does the IOS file system use to represent external file systems for reference in different IOS commands?

network

which of the following types does the ios file system use to represent external file systems for reference in different ios commands?

network

which cisco ios command would be used to delete specific line from an extended IP ACL?

no sequence-number

in a controller-based network architecture, the controller communicates with applications using a(n)

northbound interface

in a controller-based network architecture, the controller communicates with networking devices using a(n)

northbound interface

the command enable algorithm-type sha256 secret password enables which of the following configurations?

type 8

Which of these are properties of site-to-site VPNs?

typical use is for permanent connections typical security protocol is ipsec

every image, video, audio, or animation within a web page is stored as a separate file called a(n) ___ on a web server

object

Which of the following types does the IOS file system use to represent logical internal file systems for the convenience of internal functions and commands?

opaque

which of the following types does the IOS file system use to represent logical internal file systems for the convenience of internal functions and commands?

opaque

cisco's ___ acts as its commercial version of opendaylight

open sdn controller (osc)

which SDA component consists of the mechanisms to create VXLAN tunnels between SDA switches?

overlay

which components operate on the southbound side of sda model?

overlay underlay fabric

Refer to the figure. What type of network topology does this configuration represent?

partial mesh

on an ntp server, what does the stratum level indicate?

perceived accuracy of its reference clock data

SOHO refers to what type of network?

personal networks in homes or small offices

what type of attack lures victims into visiting malicious websites, such as with fake emails?

phishing

which of the following steps should be done to upgrade an ios image into flash memory after the ios image is obtained from cisco?

place the ios image in a location the router can reach

what file type tells ansible what to do, with actions and logic?

playbook

tcp and udp are protocols working at the transport later of the osi model. they perform multiplexing using ___

port numbers

from the following list, identify the port number(s) used by the ftp protocol?

ports 20 and 21

A(n) ________ cloud creates a service inside a company to internal customers

private

What different technologies were used to solve the short-term IPv4 address exhaustion problem?

private addressing CIDR NAT

in a formal uri, which component corresponds to a server's name in a web address?

protocol

in the ip header, which field identifies the header that followed the ip header?

protocol type

What is the name given to MPLS devices that sit at the edge of the SP's network?

provider edge

A(n) ________ cloud provider offers services, selling those services to customers in other companies.

public

a(n) ___ cloud provide offers services, selling those services to customers in other companies

public

ansible uses a ___ model, whereas puppet and chef use a __ model

push pull

which cisco ios extended acl port number keyword would be used to match a specific port number range?

range

___ is a transport layer protocol that is connectionless and provides no reliability, no windowing, no reordering, and no segmentation

udp

which of these text files in chef contains the logic applied to resources to determine when, how, and whether to act against the resources?

recipe

an attacker uncovering public details like who owns a domain is an example of what type of attack?

reconnaissance

an engineer needs to add an additional access point to extend the range of their wireless network. however, it's not possible to run a wired network cable to the new access point. What could this engineer do so that the new wireless access point doesn't require a wired connection to the access point?

repeater mode

what does the acrynum REST stand for?

representational state transfer

what is the purpose of a data serialization language?

represents variables with text rather than a particular programming language

which port security violation mode discard the offending traffic and logs the violation, but does not disable the port?

restrict

what does an API call do?

retrieves data from another application's API

which RFC specifies ip address allocation for private internets?

rfc 1918

a user has a laptop so that she can move freely around the office building and work in different locations. as the user walks through the building, her device immediately connects to the closest access point. What is this known as?

roaming

a greenfield sda fabric uses what type of design?

routed access layer design

What is a typical use for PoE?

security cameras

before data can be sent using TCP, a connection must be established first. this connection establishment refers to the process of initializing and agreeing on which of the following values?

sequence fields acknowledgement fields port numbers

which of these is the correct syntax for setting password encryption?

service password-encryption

you are about to save your startup-configuration file to your local file server as a backup. You want to ensure that the passwords in the file cannot be read by anyone opening the file. which of the following commands could you issue on the swtich to make the password not viewable?

service password-encryption

which wcl port is used for out-of-band management, system recovery, and initial boot functions and always connects to a switch port in access mode?

service port

Which Cisco IOS command is used to display whether CDP is enabled globally and what its current timers are?

show cdp

which cisco IOS command is used to display whether cdp is enabled globally and what its current timers are?

show cdp

which cisco ios command(s) can be used to display the configured ip information for a remote neighbor?

show cdp entry show cdp neighbors detail

What is the correct syntax for viewing details about neighboring devices?

show cdp neighbors detail

which cisco ios command is used to display the automatic sequence numbers that have been assigned to the statements of a numbered IP ACL?

show ip access-lists

which cisco ios command is used to list whether an ip acl is configured on an interface?

show ip interface

You are troubleshooting the NAT/PAT configuration on your new router. Which of the following commands could you use in your troubleshooting efforts to list the static NAT entries created in the configuration?

show ip nat translations

How do you display logged activity?

show logging

what command will show you the mac table entries associated with ports using port security?

show mac address-table secure

what command lists the configuration settings for port security on an interface?

show port-security interface

what two commands can you use to verify the relay agent?

show running-config show ip interface

___ is an application layer protocol that provides a message format for communication between managers and agents

snmp

in which type of attack is human trust and social behavior used as a point of vulnerability for attack?

social engineering

applications such as FTP or Telnet open a ___ using a well-known port and listen for connection requests

socket

what is ansible?

sofware package company name

in what type of network does the wireless ap act autonomously, rather than with a cisco wireless lan controller (wlc)?

soho??

in autonomous ap architecture, what should be used on each switch to prevent loops from forming and corrupting your network?

spanning tree protocol

Which of the following topologies is a design in which one central device connects to several others?

star topology

What does PoE do?

supplies power over ethernet cables

what does PoE do?

supplies power over ethernet cables

what subcommand enables port security on the interface?

switchport port-security

what is the purpose of the digital network (dna) center?

takes the information collected in a policy and translates it

what protocol and port number are used for POP3 traffic?

tcp, 110

what protocol and port number are used for smtp traffic?

tcp, 25

For Telnet and SSH users, which of the following commands will allow the terminal user to receive the log messages?

terminal monitor

for telnet and ssh users, which of the following commands will allow the terminal user to receive the log messages?

terminal monitor

in password hashing, it is essential that ___

the has algorithm must result in computationally difficut math every possible input value must result in a single hashed value

in server virtulization, a host is defined as what component?

the physical server on which the hypervisor runs the vm

when using MD5 hashing with the enable secret command, what process is taken with the user-entered password to verify its correctness?

the user-entered password is hashed and compared to the stored hash

Which of these true of full mesh topology?

there are multiple paths to each destination

which of these is not a feature of configuration provisioning?

these are all features of configuration provisioning

Which of the following fields can be toggled on and off in an IOS log message?

time stamp sequence number

Which field is used within the IPv6 packet header for QoS markings?

traffic class

________ are SNMP messages sent from the network device (agent) that also list the state of an MIB variable

traps

The term ________ generically refers to any protocol's packet that is sent by encapsulating a packet inside another packet

tunnel

which of these is one of the primary actions performed by an application?

update

which of these are features of cisco prime infrastructure?

uses snmp, sh, and telnet to discover devices simplifies QoS configuration deployment to each device provides support for traditional enterprise LAN, WAN, and data center management

Virtual servers use an internal Ethernet switch concept called the ________

vSwitch

a configuration template is combined with ___ to fill in the parts of the template that change from instance to instance

varibles

which versions of snmp rely on community strings, which are used to authenticate access to MIB objects?

version 2c version 1 version 3

what is another common term that is used to describe what the MEF calls E-line services?

vpws

virtual servers use an internal ethernet switch concept called the ___

vswitch

certain ___ are inevitable because not having them would prohibit legitimate uses

vulnerabilities

what protocol is used to create the tunnels used by sda?

vxlan

for an interface that allows any three mac addresses, when does a violation occur?

when the switch receives a request to connect to the fourth mac address

tcp flow control using windowing is implemented by controlling ___

window sizes

which OSes support the use of netstat -rn command?

windows macOS linux

which type of malware replicates itself and spreads through other systems through their vulnerabilities?

worm

which wpa version has encryption and mic with aes and gcmp?

wpa3

which cisco ios access-list command application keywords would be used to match http traffic?

www

refer to the figure. does a single point of failure exist in the topology shown? if so, where?

yes, between sw2 and r2


Conjuntos de estudio relacionados

Financial Accounting: Chapter 9: Plant Assets, Natural Resources and Intangible Assets

View Set

Chapter 6: Cost-Volume-Profit Relationships

View Set

AAPMR QBank - Patient Evaluation and Diagnosis

View Set

Prep-U Chapter 50: Assessment and management of patients with biliary disorders, PrepU Chapter 50: Biliary Disorders, PANCREATIC REVIEW

View Set

Google Digital Garage Certification Exam

View Set

BADM Principles of Marketing: Unit 10

View Set

Varcarolis: Chapter 27 - Anger, Aggression, and Violence

View Set