NET 226 - Final
How much total bandwidth is provided by a T1 line? 128 b/s 1.544 Mb/s 43.736 Mb/s 64 kb/s
1.544 Mb/s
What range of IP addresses is represented by the network and wildcard mask 192.168.70.0 0.0.0.127?
192.168.70.0 to 192.168.70.127
How many "things" are predicted to be interconnected on the Internet by 2020? 1 million 5 million 1 billion 50 billion
50 billion
Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer? routing table MAC address table ARP cache neighbor table
ARP cache
Which WAN technology is cell-based and well suited to carry voice and video traffic? ISDN VSAT Frame Relay ATM
ATM
Which WAN technology uses a fixed payload of 48 bytes and is transported across both switched and permanent virtual circuits? ATM ISDN Frame Relay Metro Ethernet
ATM
Refer to the exhibit. What can be concluded from the produced output? An ACL was configured to restrict SNMP access to an SNMP manager. The location of the device was not configured with the snmp-server location command. This is the output of the show snmp command without any parameters. The system contact was not configured with the snmp-server contact command.
An ACL was configured to restrict SNMP access to an SNMP manager.*
Refer to the exhibit. Which routing protocol would likely be used to distribute routes between these routers? RIP BGP OSPF EIGRP
BGP
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. What is the code displayed on the web page? Welldone! Configuration is correct! BGP is configured! BGP is running!
BGP is running!
Which queuing method provides user-defined traffic classes where each traffic class has a FIFO queue? FCFS WFQ CBWFQ FIFO
CBWFQ
Which service is enabled on a Cisco router by default that can reveal significant information about the router and potentially make it more vulnerable to attack? HTTP CDP FTP LLDP
CDP
Fill in the blank. Use the acronym. PPP supports __________ authentication that can be used by ISPs to securely authenticate users prior to providing services.
CHAP
Which protocol is used by PPP to provide authentication and protection from playback attacks? NCP LCP PAP CHAP
CHAP
What equipment at the cable service provider office connects the office to the subscriber locations? CMTS DSLAM CSU/DSU access server
CMTS
What is a component of an ADSL connection that is located at the customer site? CO CPE SOHO DSLAM
CPE
What technology allows users to access data anywhere and at any time? data analytics Cloud computing micromarketing virtualization
Cloud computing
What is a difference between the functions of Cloud computing and virtualization? - Cloud computing utilizes data center technology whereas virtualization is not used in data centers. - Cloud computing requires hypervisor technology whereas virtualization is a fault tolerance technology. - Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware. - Cloud computing provides services on web-based access whereas virtualization provides services on data access through virtualized Internet connections.
Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.
What are the three methods of establishing a VPN connection offered by Cisco devices? (Choose three.) GRE PPPoE IPsec site-to-site remote access web-based SSL
GRE, IPsec, web-based SSL
Match the private WAN technology to its application. (Not all options are used.) ISDN BRI dialup leased line VSAT - when connectivity in a remote location is needed and there are no service providers that offer WAN service - when 2 B channels and 1 D channel are used to provide additional capacity - when link speeds of OC-12 (622 Mbps) and faster have to be supported - when permanent point-to-point dedicated connections are required - when intermittent, low-volume data transfers are needed
ISDN - when 2 B channels and 1 D channel are used to provide additional capacity dialup - when intermittent, low-volume data transfers are needed leased line - when permanent point-to-point dedicated connections are required VSAT - when connectivity in a remote location is needed and there are no service providers that offer WAN service
Which one of the WAN technologies is inadequate for video traffic but operates adequately for voice traffic? ISDN BRI ATM Ethernet WAN dialup
ISDN BRI
A network administrator issues two commands on a router: R1(config)# snmp-server host 10.10.50.25 version 2c campus R1(config)# snmp-server enable traps What can be concluded after the commands are entered? The snmp-server enable traps command needs to be used repeatedly if a particular subset of trap types is desired. No traps are sent, because the notification-types argument was not specified yet. Traps are sent with the source IP address as 10.10.50.25. If an interface comes up, a trap is sent to the server.
If an interface comes up, a trap is sent to the server.*
What are two approaches to prevent packet loss due to congestion on an interface? (Choose two.) Increase link capacity. Drop lower-priority packets. Prevent bursts of traffic. Disable queuing mechanisms. Decrease buffer space.
Increase link capacity.* Drop lower-priority packets.*
Which QoS model is very resource intensive and provides the highest guarantee of QoS? soft QoS DiffServ IntServ best-effort
IntServ
A new corporation needs a data network that must meet certain requirements. The network must provide a low cost connection to sales people dispersed over a large geographical area. Which two types of WAN infrastructure would meet the requirements? (Choose two.) Internet satellite private infrastructure public infrastructure dedicated
Internet public infrastructure
What is the term for the extension of the existing Internet structure to billions of connected devices? IoT SCADA digitization M2M
IoT
Refer to the exhibit. A network administrator issues the commands in order to configure secure remote access to the router. However, the administrator notices that sessions are still being made over telent and are in plain-text. What action should be taken to encrypt the remote access traffic? - Use the enable secret command to configure encryption. - Add the service password-encryption command to the configuration. - Replace the login command with login local. - Issue the no transport input telnet ssh command and then issue the transport input ssh command.
Issue the no transport input telnet ssh command and then issue the transport input ssh command.
What function does NCP perform in the establishment of a PPP session? - It opens the connections and negotiates configuration options. - It completes the specific configuration of the network layer protocol that is being used. - It tests the link to determine whether the link quality is sufficient to bring up network layer protocols. - It provides automatic configuration of the interfaces at each end including detecting common configuration errors.
It completes the specific configuration of the network layer protocol that is being used.
What guideline is generally followed about the placement of extended access control lists? - They should be placed as close as possible to the destination of the traffic to be denied. - They should be placed on the fastest interface available. - They should be placed as close as possible to the source of the traffic to be denied. - They should be placed on the destination WAN link.
They should be placed as close as possible to the source of the traffic to be denied.
What two fields are available in IPv4 and IPv6 headers to mark packets for QoS? (Choose two.) Class of Service Traffic Class Type of Service VLAN ID Priority
Traffic Class Type of Service
Which type of hypervisor would most likely be used in a data center? Nexus Hadoop Type 1 Type 2
Type 1
What is a drawback of the local database method of securing device access that can be solved by using AAA with centralized servers? User accounts must be configured locally on each device, which is an unscalable authentication solution. There is no ability to provide accountability. It is very susceptible to brute-force attacks because there is no username. The passwords can only be stored in plain text in the running configuration.
User accounts must be configured locally on each device, which is an unscalable authentication solution.*
On which switch interface would an administrator configure an IP address so that the switch can be managed remotely? FastEthernet0/1 VLAN 1 vty 0 console 0
VLAN 1
Fill in the blank. A _________ is a secure, reliable, cost-effective way to allow remote users, branches, and suppliers to connect to resources on the company network.
VPN
What is the recommended technology to use over a public WAN infrastructure when a branch office is connected to the corporate site? municipal Wi-Fi VPN ATM ISDN
VPN
True or False? Multiple BGP processes can run on a router. true false
false
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-25_222131.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-07dsdd-25_222131.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-27_154745.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-0dff7-27_154745.jpg
Which number represents the most severe level of syslog logging? 0 1 6 7
0
Refer to the exhibit. Which IP address would be configured on the tunnel interface of the destination router? 209.165.200.225 172.16.1.2 209.165.200.226 172.16.1.1
172.16.1.2
What TCP port is used by BGP to exchange messages between routers? 22 58 179 443
179
How can SNMP access be restricted to a specific SNMP manager? - Use the snmp-server community command to configure the community string with no access level. - Specify the IP address of the SNMP manager by using the snmp-server host command. - Use the snmp-server traps command to enable traps on an SNMP manager. - Define an ACL and reference it by using the snmp-server community command.
Define an ACL and reference it by using the snmp-server community command.
What is the default queuing method used on the LAN interfaces of Cisco devices? FIFO WFQ CBWFQ LLQ
FIFO
Which TCP/IP model layer is closest to the end user? application transport internet network access
application
What command specifies a BGP neighbor that has an IP address of 5.5.5.5/24 and that is in AS 500? (config-router)# router bgp 500 (config-router)# network 5.0.0.0 0.0.0.255 (config-router)# neighbor 500 remote-as 5.5.5.5 (config-router)# neighbor 5.5.5.5 remote-as 500
(config-router)# neighbor 5.5.5.5 remote-as 500
Refer to the exhibit. On the basis of the information presented, which two IP SLA related statements are true? (Choose two.) - IP SLA 99 is measuring jitter. - IP SLA 99 is configured with the type dns target-addr 192.168.2.1 command. - IP SLA 99 is sending echo requests every 10 seconds. - IP SLA 99 is sending echo requests from IP address 192.168.2.1. - IP SLA 99 is scheduled to begin in 2 hours. - IP SLA 99 will run forever unless explicitly disabled.
- IP SLA 99 is sending echo requests every 10 seconds. - IP SLA 99 will run forever unless explicitly disabled.
A company is designing a network monitoring system and is considering SNMPv3. What are three characteristics of SNMPv3? (Choose three.) - It uses UDP port 514 to send event notifications to message collectors. - It uses message integrity to ensure that packets have not been altered in transit. - It uses expanded error codes to identify different types of error conditions. - It uses authentication to determine if messages are from a valid source. - It uses encryption to scramble the content of packets to prevent unauthorized access. - It uses a flat structure of MIB to improve the speed of access to the information.
- It uses message integrity to ensure that packets have not been altered in transit. - It uses authentication to determine if messages are from a valid source. - It uses encryption to scramble the content of packets to prevent unauthorized access.
Which two statements describe a PPP connection between two Cisco routers? (Choose two.) - Only a single NCP is allowed between the two routers. - LCP tests the quality of the link. - LCP manages compression on the link. - With CHAP authentication, the routers exchange plain text passwords. - NCP terminates the link when data exchange is complete.
- LCP tests the quality of the link. - LCP manages compression on the link.
Which three statements are true about PPP? (Choose three.) - PPP can only be used between two Cisco devices. - PPP carries packets from several network layer protocols in LCPs. - PPP can use synchronous and asynchronous circuits. - PPP uses LCPs to establish, configure, and test the data-link connection. - PPP uses LCPs to agree on format options such as authentication, compression, and error detection.
- PPP uses LCPs to agree on format options such as authentication, compression, and error detection. - PPP uses LCPs to establish, configure, and test the data-link connection. - PPP can use synchronous and asynchronous circuits.
What are two characteristics of SNMP community strings? (Choose two.) - A vulnerability of SNMPv1, SNMPv2, and SNMPv3 is that they send the community strings in plaintext. - Commonly known community strings should be used when configuring secure SNMP. - If the manager sends one of the correct read-only community strings, it can get information and set information in an agent. - SNMP read-only community strings can be used to get information from an SNMP-enabled device. - SNMP read-write community strings can be used to set information on an SNMP-enabled device.
- SNMP read-only community strings can be used to get information from an SNMP-enabled device. - SNMP read-write community strings can be used to set information on an SNMP-enabled device.
Which three statements describe SPAN and RSPAN? (Choose three.) - SPAN can send a copy of traffic to a port on another switch. - RSPAN is required for syslog and SNMP implementation. - SPAN can be configured to send a copy of traffic to a destination port on the same switch. - SPAN can copy traffic on a source port or source VLAN to a destination port on the same switch. - RSPAN is required to copy traffic on a source VLAN to a destination port on the same switch. - RSPAN can be used to forward traffic to reach an IPS that is analyzing traffic for malicious behavior.
- SPAN can be configured to send a copy of traffic to a destination port on the same switch. - SPAN can copy traffic on a source port or source VLAN to a destination port on the same switch. - RSPAN can be used to forward traffic to reach an IPS that is analyzing traffic for malicious behavior.
Which two pieces of information are required when creating a standard access control list? (Choose two.) - destination address and wildcard mask - access list number between 100 and 199 - access list number between 1 and 99 - source address and wildcard mask - subnet mask and wildcard mask
- access list number between 1 and 99 - source address and wildcard mask
Which three values or sets of values are included when creating an extended access control list entry? (Choose three.) - source subnet mask and wildcard mask - default gateway address and wildcard mask - destination subnet mask and wildcard mask - destination address and wildcard mask - source address and wildcard mask - access list number between 1 and 99 - access list number between 100 and 199
- destination address and wildcard mask - access list number between 100 and 199 - source address and wildcard mask
What are three new challenges associated with the rapid growth of the IoT? (Choose three.) - increasing the CPU power of computers - integrating new things into existing networks - improving the Internet connections from homes - securing new devices with varying level of security - developing better routing protocols for new devices - integrating many devices from different vendors with custom applications
- integrating new things into existing networks - securing new devices with varying level of security - integrating many devices from different vendors with custom applications
Which two business and technical challenges does implementing virtualization within a data center help businesses to overcome? (Choose two.) - virus and spyware attacks - server hardware needs - power and air conditioning - physical footprint - operating system license requirements
- power and air conditioning - physical footprint
Which two options are negotiated via NCP during the establishment of a PPP connection that will use the IPv4 network layer protocol? (Choose two.) - authentication using either PAP or CHAP - the algorithm to compress TCP and IP headers - compression using either Stacker or Predictor - multilink to combine two or more channels - an IPv4 address to use for routing IP over the PPP link
- the algorithm to compress TCP and IP headers - an IPv4 address to use for routing IP over the PPP link
What are two reasons to create a network baseline? (Choose two.) - to determine what kind of equipment to implement - to evaluate security vulnerabilities in the network - to identify future abnormal network behavior - to design a network according to a proper model - to determine if the network can deliver the required policies - to select a routing protocol
- to identify future abnormal network behavior - to determine if the network can deliver the required policies
What are two reasons to implement passive interfaces in the EIGRP configuration of a Cisco router? (Choose two.) - to mitigate attacks coming from the interfaces - to exclude interfaces from load balancing - to provide increased network security - to avoid unnecessary update traffic - to shut down unused interfaces
- to provide increased network security - to avoid unnecessary update traffic
Fill in the blanks. Use dotted decimal format. The wildcard mask that is associated with the network 192.168.12.0/24 is
0.0.0.255
Fill in the blanks. Use dotted decimal format. The wildcard mask that is associated with 192.168.12.96/27 is __________.
0.0.0.31
A network administrator is designing an ACL. The networks 192.168.1.0/25, 192.168.0.0/25, 192.168.0.128/25, 192.168.1.128/26, and 192.168.1.192/26 are affected by the ACL. Which wildcard mask, if any, is the most efficient to use when specifying all of these networks in a single ACL permit entry? 0.0.0.127 0.0.0.255 0.0.1.255 0.0.255.255 A single ACL command and wildcard mask should not be used to specify these particular networks or other traffic will be permitted or denied and present a security risk.
0.0.1.255
What three blocks of addresses are defined by RFC 1918 for private network use? (Choose three.) 169.254.0.0/16 239.0.0.0/8 10.0.0.0/8 192.168.0.0/16 172.16.0.0/12 100.64.0.0/14
10.0.0.0/8 192.168.0.0/16 172.16.0.0/12
Which range represents all the IP addresses that are affected when network 10.120.160.0 with a wildcard mask of 0.0.7.255 is used in an ACE? 10.120.160.0 to 10.120.168.0 10.120.160.0 to 10.120.191.255 10.120.160.0 to 10.120.167.255 10.120.160.0 to 10.127.255.255
10.120.160.0 to 10.120.167.255
A network administrator configures an ACL with the command R1(config)# access-list 1 permit 172.16.0.0 0.0.15.255. Which two IP addresses will match this ACL statement? (Choose two.) 172.16.0.255 172.16.15.36 172.16.16.12 172.16.31.24 172.16.65.21
172.16.0.255 172.16.15.36
Which IPv4 address range covers all IP addresses that match the ACL filter specified by 172.16.2.0 with wildcard mask 0.0.1.255? 172.16.2.0 to 172.16.2.255 172.16.2.1 to 172.16.3.254 172.16.2.0 to 172.16.3.255 172.16.2.1 to 172.16.255.255
172.16.2.0 to 172.16.3.255
Refer to the exhibit. Which IP address is configured on the physical interface of the CORP router? 10.1.1.1 209.165.202.134 10.1.1.2 209.165.202.133
209.165.202.133
Refer to the exhibit. This ACL is applied on traffic outbound from the router on the interface that directly connects to the 10.0.70.5 server. A request for information from a secure web page is sent from host 10.0.55.23 and is destined for the 10.0.70.5 server. Which line of the access list will cause the router to take action (forward the packet onward or drop the packet)? the deny ip any any that is at the end of every ACL 2 4 5 1 3
3
What is the approximate distance limitation for providing a satisfactory ADSL service from the central office to a customer? 6.21 miles or 10 kilometers 3.39 miles or 5.46 kilometers 2.11 miles or 3.39 kilometers 11.18 miles or 18 kilometers
3.39 miles or 5.46 kilometers
https://ccnav6.com/wp-content/uploads/2017/07/i278737v1n1_278737.png Refer to the exhibit. All routers are successfully running the BGP routing protocol. How many routers must use EBGP in order to share routing information across the autonomous systems? 2 4 5 3
4
Refer to the exhibit. PC1 and PC2 should be able to obtain IP address assignments from the DHCP server. How many ports among switches should be assigned as trusted ports as part of the DHCP snooping configuration? 1 3 5 7
7
How many levels of priority are possible when using class of service (CoS) marking on frames? 3 8 24 64
8
Which protocol defines port-based authentication to restrict unauthorized hosts from connecting to the LAN through publicly accessible switch ports? SSH RADIUS 802.1x TACACS+
802.1x
Today, over __% of things in the physical world are still not connected to the Internet. Select the answer that will complete the statement. 85 90 75 99
99
https://ccnav6.com/wp-content/uploads/2017/07/i217780v1n1_217780.gif Refer to the exhibit. Based on the debug command output that is shown, which statement is true of the operation of PPP? - Both PAP and CHAP authentication were attempted. - A PPP session was successfully established. - The debug output is from router R2. - CHAP authentication failed because of an unknown hostname.
A PPP session was successfully established.
Match the scenario to the WAN solution. (Not all options are used.) - A company has a headquarters and four remote locations. The headquarters site will require more bandwidth than the four remote sites. - A company requires higher download speeds than upload speeds and wants to use existing phone lines. - A company would like guaranteed bandwidth using a point-to-point link that requires minimal expertise to install and maintain. - A teleworker would like to bundle the Internet connection with other phone and TV services. - A multisite college wants to connect using Ethernet technology between the sites. Frame relay DSL MetroE T1 VSAT Cable
A company has a headquarters and four remote locations. The headquarters site will require more bandwidth than the four remote sites. - frame relay A company requires higher download speeds than upload speeds and wants to use existing phone lines. - DSL A company would like guaranteed bandwidth using a point-to-point link that requires minimal expertise to install and maintain. - T1 A teleworker would like to bundle the Internet connection with other phone and TV services. - cable A multisite college wants to connect using Ethernet technology between the sites. - MetroE
Which two scenarios are examples of remote access VPNs? (Choose two.) - A toy manufacturer has a permanent VPN connection to one of its parts suppliers. - A mobile sales agent is connecting to the company network via the Internet connection at a hotel. - An employee who is working from home uses VPN client software on a laptop in order to connect to the company network. - All users at a large branch office can access company resources through a single VPN connection. - A small branch office with three employees has a Cisco ASA that is used to create a VPN connection to the HQ.
A mobile sales agent is connecting to the company network via the Internet connection at a hotel. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. A user reports that PC0 cannot visit the web server www.server.com. Troubleshoot the network configuration to identify the problem. What is the cause of the problem? - The clock rate on Branch S0/0/0 is configured incorrectly. - A serial interface encapsulation is configured incorrectly. - The DNS server address on PC0 is configured incorrectly. - A default route on HQ is not configured.
A serial interface encapsulation is configured incorrectly.
Which statement describes SNMP operation? A set request is used by the NMS to change configuration variables in the agent device. A get request is used by the SNMP agent to query the device for data. An SNMP agent that resides on a managed device collects information about the device and stores that information remotely in the MIB that is located on the NMS. An NMS periodically polls the SNMP agents that are residing on managed devices by using traps to query the devices for data.
A set request is used by the NMS to change configuration variables in the agent device.*
What two functions describe uses of an access control list? (Choose two.) ACLs provide a basic level of security for network access. ACLs assist the router in determining the best path to a destination. ACLs can permit or deny traffic based upon the MAC address originating on the router. ACLs can control which areas a host can access on a network. Standard ACLs can restrict access to specific applications and ports.
ACLs can control which areas a host can access on a network. ACLs provide a basic level of security for network access.
Refer to the exhibit. Based on the output generated by the show monitor session 1 command, how will SPAN operate on the switch? All traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1. Native VLAN traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1. All traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1. Native VLAN traffic transmitted from VLAN 10 or received on VLAN 20 is forwarded to FastEthernet 0/1.
All traffic received on VLAN 10 or transmitted from VLAN 20 is forwarded to FastEthernet 0/1.*
A network engineer is investigating an access issue to a web server. The web server can access the Internet and the local clients can open the web pages. However, outside clients cannot access the web pages. What is the most likely cause of the problem? - The web server does not have a default gateway configured. - An ACL is blocking incoming connections. - There is a cable fault. - There are excessive broadcasts in the network.
An ACL is blocking incoming connections.
A network engineer has been tasked with connecting two large autonomous systems (AS) together over the Internet. Which routing protocol should be selected? EIGRP IS-IS OSPFv2 BGP
BGP
An administrator has mastered the use of access control lists (ACLs) and wants to deploy QoS by defining different traffic classes through the use of ACLs. Which queuing method provides this functionality? WFQ FCFS CBWFQ FIFO
CBWFQ
What are two WAN connection enhancements that are achieved by implementing PPPoE? (Choose two.) Encapsulating Ethernet frames within PPP frames is an efficient use of bandwidth. PPP enables the ISP to assign an IP address to the customer WAN interface. DSL CHAP features are included in PPPoE. CHAP enables customer authentication and accounting. An Ethernet link supports a number of data link protocols.
CHAP enables customer authentication and accounting. PPP enables the ISP to assign an IP address to the customer WAN interface.
Which equipment is needed for an ISP to provide Internet connections through cable service? CSU/DSU CMTS access server DSLAM
CMTS
Which type of QoS marking is applied to Ethernet frames? DSCP CoS IP precedence ToS
CoS
Refer to the exhibit. A network engineer has issued the show interfaces serial 0/0/0 command on a router to examine the open NCPs on a PPP link to another router. The command output displays that the encapsulation is PPP and that the LCP is open. However, the IPV6CP NCP is not shown as open. What does the engineer need to configure to open the IPV6CP NCP on the link? - Configure CHAP authentication on each router. - Configure PPP multilink interfaces on each router. - Issue the compress predictor command on each interface - on the link. - Configure an IPv6 address on each interface on the link.
Configure an IPv6 address on each interface on the link.
During a PPP session establishment phase, which two messages are sent by the requested party if the options are not acceptable? (Choose two.) Configure-Nak Code-Reject Protocol-Reject Configure-Reject Discard-Request
Configure-Nak Configure-Reject
After gathering symptoms, if the troubleshooter determines that the problem is located outside the control of the organization, what is the next step? - Question the end users. - Analyze existing symptoms. - Narrow the scope of the problem. - Gather symptoms from suspected devices. - Contact the administrator of the external system.
Contact the administrator of the external system.
Refer to the exhibit. What action occurs at stage 3 of the general troubleshooting process? Correct the problem. Question end users. Narrow the scope. Document symptoms.
Correct the problem.
Each line in the diagram represents a single connection from a user AS to an ISP AS. In which multihomed configuration is it necessary, if not required, to use BGP to exchange routing information? A B C D
D
What network attack seeks to create a DoS for clients by preventing them from being able to obtain a DHCP lease? DHCP starvation DHCP spoofing IP address spoofing CAM table attack
DHCP starvation
A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used? DSL dial-up satellite cell modem cable modem
DSL
Which feature is used when connecting to the Internet using DSL? IEEE 802.16 CMTS LTE DSLAM
DSLAM
Which two devices are needed when a digital leased line is used to provide a connection between the customer and the service provider? (Choose two.) dialup modem Layer 2 switch DSU CSU access server
DSU CSU
What is a long distance fiber-optic media technology that supports both SONET and SDH, and assigns incoming optical signals to specific wavelengths of light? ISDN ATM DWDM MPLS
DWDM
What happens when an edge router using IntServ QoS determines that the data pathway cannot support the level of QoS requested? - Data is forwarded along the pathway using a best-effort approach. - Data is forwarded along the pathway using DiffServ. - Data is not forwarded along the pathway. - Data is forwarded along the pathway using IntServ but not provided preferential treatment.
Data is not forwarded along the pathway.
Which QoS model uses the DSCP bits to mark packets and provides 64 possible classes of service? FIFO DiffServ best-effort IntServ
DiffServ
What is a characteristic of data flow processing in SDN? - The SDN controller attaches an entry to each packet to identify the flow. - OpenStack is used to construct the entry in switches to facilitate data forwarding. - Each data flow through the network must be approved by the SDN controller first. - The SDN controller routes a data flow first and the data plane will use policies to permit or deny the flow.
Each data flow through the network must be approved by the SDN controller first.
Which network scenario will require the use of a WAN? - Employees need to access web pages that are hosted on the corporate web servers in the DMZ within their building. - Employee workstations need to obtain dynamically assigned IP addresses. - Employees need to connect to the corporate email server through a VPN while traveling. - Employees in the branch office need to share files with the headquarters office that is located in a separate building on the same campus network.
Employees need to connect to the corporate email server through a VPN while traveling.
What mitigation plan is best for thwarting a DoS attack that is creating a switch buffer overflow? - Disable DTP. - Disable STP. - Enable port security. - Place unused ports in an unused VLAN.
Enable port security.
What are three techniques for mitigating VLAN attacks? (Choose three.) Disable DTP. Use private VLANs. Set the native VLAN to an unused VLAN. Enable Source Guard. Enable trunking manually. Enable BPDU guard.
Enable trunking manually. Disable DTP.* Set the native VLAN to an unused VLAN.*
A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended? Ethernet WAN Frame Relay ISDN VSAT
Ethernet WAN
A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need? packet-switched network circuit-switched network MPLS Ethernet WAN
Ethernet WAN
Which two statements are correct about extended ACLs? (Choose two) Multiple ACLs can be placed on the same interface as long as they are in the same direction. Port numbers can be used to add greater definition to an ACL. Extended ACLs evaluate the source and destination addresses. Extended ACLs end with an implicit permit statement. Extended ACLs use a number range from 1-99.
Extended ACLs evaluate the source and destination addresses.* Port numbers can be used to add greater definition to an ACL.*
Which queuing algorithm has only a single queue and treats all packets equally? WFQ FIFO CBWFQ LLQ
FIFO
What three application layer protocols are part of the TCP/IP protocol suite? (Choose three.) FTP NAT ARP DHCP PPP DNS
FTP DHCP DNS
Which field marks the beginning and end of an HDLC frame? Flag Control FCS Data
Flag
Which two technologies are categorized as private WAN infrastructures? (Choose two.) cable DSL Frame Relay MetroE VPN
Frame relay MetroE
What is a requirement of a connectionless packet-switched network? - The network predetermines the route for a packet. - A virtual circuit is created for the duration of the packet delivery. - Each packet has to carry only an identifier. - Full addressing information must be carried in each data packet.
Full addressing information must be carried in each data packet.
Refer to the exhibit. Which interface on switch S1 should be configured as a DHCP snooping trusted port to help mitigate DHCP spoofing attacks? G0/23 G0/24 G0/22 G0/1
G0/23
Open the PT Activity. Perform the tasks in the activity and then answer the question. Which message is displayed by Web Server1? Success! VPN works! GRE UP! Well done!
GRE UP!
Which three statements are characteristics of generic routing encapsulation (GRE)? (Choose three.) GRE does not have strong security mechanisms. GRE encapsulation supports any OSI Layer 3 protocol. GRE is stateless. The GRE header alone adds at least 24 bytes of overhead. GRE is the most secure tunneling protocol. GRE provides flow control by default.
GRE does not have strong security mechanisms. GRE encapsulation supports any OSI Layer 3 protocol. GRE is stateless.
https://ccnav6.com/wp-content/uploads/2017/07/i287913v1n1_222634.png Refer to the exhibit. What type of Layer 2 encapsulation will be used for connection D on the basis of this configuration on a newly installed router: RtrA(config)# interface serial0/0/0 RtrA(config-if)# ip address 128.107.0.2 255.255.255.252 RtrA(config-if)# no shutdown PPP HDLC Frame Relay Ethernet
HDLC
Fill in the blank. The default encapsulation for WAN interfaces is ___________ on Cisco routers.
HDLC High-Level Data Link Control High Level Data Link Control
Which three physical layer interfaces support PPP? (Choose three.) HSSI synchronous serial FastEthernet asynchronous serial GigabitEthernet Ethernet
HSSI synchronous serial asynchronous serial
Refer to the exhibit. The IPv6 access list LIMITED_ACCESS is applied on the S0/0/0 interface of R1 in the inbound direction. Which IPv6 packets from the ISP will be dropped by the ACL on R1? ICMPv6 packets that are destined to PC1 packets that are destined to PC1 on port 80 HTTPS packets to PC1 neighbor advertisements that are received from the ISP router
ICMPv6 packets that are destined to PC1*
Which feature sends simulated data across the network and measures performance between multiple network locations? LLDP IP SLA syslog SPAN
IP SLA
Which feature sends simulated data across the network and measures performance between multiple network locations? LLDP syslog IP SLA SPAN
IP SLA
Which three pieces of information are typically recorded in a logical topology diagram? (Choose three.) - device locations - routing protocols - cable specifications - device models and manufacturers - static routes - IP address and prefix lengths
IP address and prefix lengths routing protocols static routes
Which device would be classified as a trusted endpoint? switch router firewall IP phone
IP phone
Which PPP protocol allows a device to specify an IP address for routing over the PPP link? PAP CHAP LCP IPCP
IPCP
What are two common types of circuit-switched WAN technologies? (Choose two.) Frame Relay ISDN ATM PSTN DSL
ISDN PTSN
Which two technologies use the PSTN network to provide an Internet connection? (Choose two.) MPLS Frame Relay dialup ATM ISDN
ISDN dialup
Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand? PaaS ITaaS IaaS SaaS
IaaS
Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. Why is the serial link between router R1 and router R2 not operational? - In each case the expected username is not the same as the remote router hostname. - The encapsulation in both routers does not match. - The passwords are different in both routers. - The authentication type is not the same in both routers.
In each case the expected username is not the same as the remote router hostname.
Which statement describes a difference between the operation of inbound and outbound ACLs? - In contrast to outbound ALCs, inbound ACLs can be used to filter packets with multiple criteria. - Inbound ACLs can be used in both routers and switches but outbound ACLs can be used only on routers. - Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed. - On a network interface, more than one inbound ACL can be configured but only one outbound ACL can be configured.
Inbound ACLs are processed before the packets are routed while outbound ACLs are processed after the routing is completed.
A network engineer is monitoring an essential, but poor quality, PPP WAN link that periodically shuts down. An examination of the interface configurations shows that the ppp quality 90 command has been issued. What action could the engineer take to reduce the frequency with which the link shuts down? - Issue the command ppp quality 100. - Use the bandwidth command to increase the bandwidth of the link. - Set the DCE interface to a lower clock rate. - Issue the command ppp quality 70.
Issue the command ppp quality 70.
What functionality does mGRE provide to the DMVPN technology? It is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner. It creates a distributed mapping database of public IP addresses for all VPN tunnel spokes. It provides secure transport of private information over public networks, such as the Internet. It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.
It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.
Which statement describes the function of the SPAN tool used in a Cisco switch? It is a secure channel for a switch to send logging to a syslog server. It supports the SNMP trap operation on a switch. It copies the traffic from one switch port and sends it to another switch port that is connected to a monitoring device. It provides interconnection between VLANs over multiple switches.
It copies the traffic from one switch port and sends it to another switch port that is connected to a monitoring device.*
What statement describes Fog computing? - It requires Cloud computing services to support non-IP enabled sensors and controllers. - It utilizes a centralized computing infrastructure that stores and manipulates big data in one very secure data center. - It supports larger networks than Cloud computing does. - It creates a distributed computing infrastructure that provides services close to the network edge.
It creates a distributed computing infrastructure that provides services close to the network edge.
What is a purpose of establishing a network baseline? - It creates a point of reference for future network evaluations. - It provides a statistical average for network performance. - It manages the performance of network devices. - It checks the security configuration of network devices.
It creates a point of reference for future network evaluations.
Which statement describes the physical topology for a LAN? - It depicts the addressing scheme that is employed in the LAN. - It describes whether the LAN is a broadcast or token-passing network. - It defines how hosts and network devices connect to the LAN. - It shows the order in which hosts access the network.
It defines how hosts and network devices connect to the LAN.
How does implementing STP allow for a scalable network design? - It filters broadcasts and other undesirable traffic from the network. - It eliminates Layer 2 loops from redundant links. - It provides failover services when duplicate network equipment is used. - It prevents local traffic from propagating to other parts of the network.
It eliminates Layer 2 loops from redundant links.
What is a characteristic of a default static route? - It backs up a route already discovered by a dynamic routing protocol. - It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route. - It is configured with a higher administrative distance than is the original dynamic routing protocol. - It uses a single network address to send multiple static routes to one destination address.
It identifies the gateway IP address to which the router sends all IP packets for which it does not have a learned or static route.
What is Fog computing? - It is a type of computing that enhances P2P applications. - It is a type of computing that sends controller data to a sensor. - It is a type of computing that disperses servers and services globally in distributed data centers. - It is a type of computing where services are hosted where they are used, such as at the network edge or with end devices.
It is a type of computing where services are hosted where they are used, such as at the network edge or with end devices.
Which statement describes the Cisco IoT System? - It is a switch operating system to integrate many Layer 2 security features. - It is an infrastructure to manage large scale systems of very different endpoints and platforms. - It is a router operating system combining IOS and Linux for fog computing. - It is an advanced routing protocol for cloud computing.
It is an infrastructure to manage large scale systems of very different endpoints and platforms.
Which statement describes a route that has been learned dynamically? - It is unaffected by changes in the topology of the network. - It is identified by the prefix C in the routing table. - It is automatically updated and maintained by routing protocols. - It has an administrative distance of 1.
It is automatically updated and maintained by routing protocols.
A network administrator is entering the command ipv6 unicast-routing to start configuring DHCPv6 operation on a router. Which statement describes the function of this command? - It is required for sending ICMPv6 RA messages. - It is required for enabling DNS service in DHCPv6 configurations. - It is required to configure stateful DHCPv6 server on the router. - It is required to configure stateless DHCPv6 server on the router.
It is required for sending ICMPv6 RA messages.*
Which two statements describe a remote access VPN? (Choose two.) It requires hosts to send TCP/IP traffic through a VPN gateway. It is used to connect individual hosts securely to a company network over the Internet. It requires static configuration of the VPN tunnel. It connects entire networks to each other. It may require VPN client software on hosts
It may require VPN client software on hosts It is used to connect individual hosts securely to a company network over the Internet.
Which is a requirement of a site-to-site VPN? It requires the placement of a VPN server at the edge of the company network. It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic. It requires hosts to use VPN client software to encapsulate traffic. It requires a client/server architecture.
It requires a VPN gateway at each end of the tunnel to encrypt and decrypt traffic.
What are two characteristics of the best-effort QoS model? (Choose two.) It treats all network packets in the same way. It allows end hosts to signal their QoS needs to the network. It provides preferential treatment for voice packets. It does not provide a delivery guarantee for packets. It uses a connection-oriented approach with QoS.
It treats all network packets in the same way.* It does not provide a delivery guarantee for packets.*
A network administrator has issued the snmp-server user admin1 admin v3 encrypted auth md5 abc789 priv des 256 key99 command. What are two features of this command? (Choose two.) It restricts SNMP access to defined SNMP managers. It allows a network administrator to configure a secret encrypted password on the SNMP server. It adds a new user to the SNMP group. It forces the network manager to log into the agent to retrieve the SNMP messages. It uses the MD5 authentication of the SNMP messages.
It uses the MD5 authentication of the SNMP messages.* It adds a new user to the SNMP group.*
Which protocol will terminate the PPP link after the exchange of data is complete? IPCP NCP IPXCP LCP
LCP
What are three components of PPP? (Choose three.) parallel communications LCP NCP authorization HDLC-like framing support for LAN and WAN
LCP NCP HDLC-like framing
A network administrator is deploying QoS with the ability to provide a special queue for voice traffic so that voice traffic is forwarded before network traffic in other queues. Which queuing method would be the best choice? LLQ CBWFQ WFQ FIFO
LLQ
Fill in the blank. ___________ queuing uses a strict priority queue to provide delay-sensitive traffic preferential treatment over any other traffic queue.
LLQ
Which wireless technology provides Internet access through cellular networks? WiMAX LTE satellite municipal WiFi
LTE
An administrator is troubleshooting an Internet connectivity problem on a router. The output of the show interfaces gigabitethernet 0/0 command reveals higher than normal framing errors on the interface that connects to the Internet. At what layer of the OSI model is the problem likely occurring? Layer 1 Layer 2 Layer 3 Layer 4 Layer 7
Layer 2
PPP authentication is performed at which OSI layer? Layer 1 Layer 2 Layer 3 Layer 4
Layer 2
Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.) Layer 1 Layer 2 Layer 3 Layer 4 Layer 5
Layer 2 Layer 3
What is the benefit of deploying Layer 3 QoS marking across an enterprise network? Layer 3 marking can be carried in the 802.1Q fields. Layer 3 marking can carry the QoS information end-to-end. Layer 3 marking can carry QoS information on switches that are not IP aware. Layer 3 marking can be used to carry non-IP traffic.
Layer 3 marking can carry the QoS information end-to-end.*
Which statement correctly describes a WAN technology? - ISDN PRI is intended for the home and small enterprise and provides two 64 kb/s B channels and a 16 kb/s D channel. - The 53-byte ATM cell operates more efficiently for big frames. - MPLS can be used to deliver any type of packet between sites. - VSATs create a public WAN while providing connectivity to remote locations.
MPLS can be used to deliver any type of packet between sites.
Which PPP option can detect links that are in a looped-back condition? ACCM Magic Number Callback MRU
Magic Number
Which statement describes the QoS classification and marking tools? - Marking is the adding of a value to a packet header. - Classification is performed after traffic is marked. - Marking is the identification of which QoS policy should be applied to specific packets. - Classification should be done as close to the destination device as possible.
Marking is the adding of a value to a packet header.
Which PPP option enables load balancing on PPP-enabled interfaces that connect to a single destination? PPP Callback Multilink Compression Authentication Error detection
Multilink
Which two specialized troubleshooting tools can monitor the amount of traffic that passes through a switch? (Choose two.) portable network analyzer digital multimeter DTX cable analyzer TDR NAM
NAM portable network analyzer
With which layers of the OSI model do the PPP control protocols interface? - NCP interfaces with Layer 1; LCP interfaces with Layer 2 - NCP interfaces with Layer 2; LCP interfaces with Layer 3 - NCP interfaces with Layer 1; LCP interfaces with Layer 3 - NCP interfaces with Layer 3; LCP interfaces with Layer 1
NCP interfaces with Layer 3; LCP interfaces with Layer 1
In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network? - Determine ownership. - Narrow the scope. - Document the symptoms. - Gather information. - Determine the symptoms.
Narrow the scope.
What role do network devices play in the IntServ QoS model? Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network. Network devices use QoS on a hop-by-hop basis to provide excellent scalability. Network devices provide a best-effort approach to forwarding traffic. Network devices are configured to service multiple classes of traffic and handle traffic as it may arrive.
Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.*
How is "tunneling" accomplished in a VPN? A dedicated circuit is established between the source and destination devices for the duration of the connection. Packets are disguised to look like other types of traffic so that they will be ignored by potential attackers. All packets between two hosts are assigned to a single physical medium to ensure that the packets are kept private. New headers from one or more VPN protocols encapsulate the original packets
New headers from one or more VPN protocols encapsulate the original packets
Which network traffic management technology is a basic element in SDN implementations? OpenFlow OpenStack IEEE 802.1aq Interface to the Routing System
OpenFlow
Fill in the blank. When a Cisco router is being connected to a non-Cisco router across a point-to-point serial link, the ____________ encapsulation should be configured.
PPP point to point protocol point-to-point protocol
Fill in the blank. Use only an acronym. _______ creates a PPP tunnel through the DSL connection for the purpose of sending PPP frames.
PPPoE
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks? PPPoE CHAP ADSL LTE
PPPoE
What is the protocol that provides ISPs the ability to send PPP frames over DSL networks? LTE PPPoE CHAP ADSL
PPPoE
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web? PaaS IaaS SaaS ITaaS
PaaS
What is an advantage of packet-switched technology over circuit-switched technology? - Packet-switched networks usually experience lower latency than circuit-switched networks experience. - Packet-switched networks can efficiently use multiple routes inside a service provider network. - Packet-switched networks are less susceptible to jitter than circuit-switched networks are. - Packet-switched networks do not require an expensive permanent connection to each endpoint.
Packet-switched networks can efficiently use multiple routes inside a service provider network.
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL? R1(config-if)# ip access-group 1 in R1(config-if)# ip access-group 1 out R1(config-line)# access-class 1 in R1(config-line)# access-class 1 out
R1(config-line)# access-class 1 in
Refer to the exhibit. A network administrator wants to permit only host 192.168.1.1 /24 to be able to access the server 192.168.2.1 /24. Which three commands will achieve this using best ACL placement practices? (Choose three.) R2(config)# interface fastethernet 0/0 R2(config)# access-list 101 permit ip host 192.168.1.1 host 192.168.2.1 R2(config-if)# ip access-group 101 out R2(config)# interface fastethernet 0/1 R2(config-if)# ip access-group 101 in R2(config)# access-list 101 permit ip any any R2(config)# access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
R2(config)# interface fastethernet 0/0* R2(config)# access-list 101 permit ip host 192.168.1.1 host 192.168.2.1* R2(config-if)# ip access-group 101 in*
Refer to the exhibit. Which two configurations will allow router R1 to establish a neighbor relationship with router R2? (Choose two.) R1(config)# router bgp 65002 R1(config-router)# network 192.168.20.0 R1(config-router)# neighbor 209.165.200.225 remote-as 65001 R1(config)# router bgp 65001 R1(config-router)# network 192.168.20.0 R2(config)# router bgp 65002 R2(config-router)# network 192.168.20.0 R2(config-router)# neighbor 209.165.200.225 remote-as 65001 R2(config)# router bgp 65002 R2(config-router)# network 192.168.10.0 R2(config-router)# neighbor 209.165.200.226 remote-as 65002 R1(config)# router bgp 65001 R1(config-router)# network 192.168.10.0 R1(config-router)# neighbor 209.165.200.226 remote-as 65002 R2(config)# router bgp 65002 R2(config-router)# network 192.168.10.0
R2(config)# router bgp 65002 R2(config-router)# network 192.168.20.0 R2(config-router)# neighbor 209.165.200.225 remote-as 65001 R1(config)# router bgp 65001 R1(config-router)# network 192.168.10.0 R1(config-router)# neighbor 209.165.200.226 remote-as 65002
What two protocols are supported on Cisco devices for AAA communications? (Choose two.) RADIUS HSRP LLDP VTP TACACS+
RADIUS TACACS+
What protocol is used to encapsulate the EAP data between the authenticator and authentication server performing 802.1X authentication? SSH TACACS+ RADIUS MD5
RADIUS*
The buffers for packet processing and the running configuration file are temporarily stored in which type of router memory? flash NVRAM RAM ROM
RAM
Which command can be used to view the cable type that is attached to a serial interface? - Router(config)# show controllers - Router(config)# show ip interface - Router(config)# show interfaces - Router(config)# show ip interface brief
Router(config)# show controllers
A network administrator needs to configure a standard ACL so that only the workstation of the administrator with the IP address 192.168.15.23 can access the virtual terminal of the main router. Which two configuration commands can achieve the task? (Choose two.) Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.255 Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.0 Router1(config)# access-list 10 permit 192.168.15.23 255.255.255.255
Router1(config)# access-list 10 permit host 192.168.15.23 Router1(config)# access-list 10 permit 192.168.15.23 0.0.0.0
Here is a link to the PT Activity. Open the PT Activity. Perform the tasks in the activity instructions and then answer the question. A user reports that PC0 cannot visit the web server www.server.com. Troubleshoot the network configuration to identify the problem. What is the cause of the problem? - Routing between HQ and Branch is configured incorrectly. - A serial interface on Branch is configured incorrectly. - The clock rate on one of the serial links is configured incorrectly. - The DNS server address on PC0 is configured incorrectly.
Routing between HQ and Branch is configured incorrectly.
https://ccnav6.com/wp-content/uploads/2017/07/i223533v1n1_223533.png Refer to the exhibit. Which switch will be the root bridge after the election process is complete? S1 S2 S3 S4
S2
What are two common high-bandwidth fiber-optic media standards? (Choose two.) SDH SONET ANSI ATM ITU
SDH SONET
Which technology virtualizes the network control plane and moves it to a centralized controller? SDN IaaS fog computing cloud computing
SDN
Which protocol or service can be configured to send unsolicited messages to alert the network administrator about a network event such as an extremely high CPU utilization on a router? SNMP syslog NetFlow NTP
SNMP*
Which SNMP version uses weak community string-based access control and supports bulk retrieval? SNMPv2c SNMPv1 SNMPv3 SNMPv2Classic
SNMPv2c
What network monitoring tool copies traffic moving through one switch port, and sends the copied traffic to another switch port for analysis? SNMP 802.1X syslog SPAN
SPAN
What is an example of an M2M connection in the IoT? - Redundant servers communicate with each other to determine which server should be active or standby. - Sensors in a warehouse communicate with each other and send data to a server block in the cloud. - A user sends an email over the Internet to a friend. - An automated alarm system in a campus sends fire alarm messages to all students and staff.
Sensors in a warehouse communicate with each other and send data to a server block in the cloud.
Which serial 0/0/0 interface state will be shown if no serial cable is attached to the router, but everything else has been correctly configured and turned on? - Serial 0/0/0 is up (looped) - Serial 0/0/0 is up, line protocol is up - Serial 0/0/0 is administratively down, line protocol is down - Serial 0/0/0 is up, line protocol is down - Serial 0/0/0 is down, line protocol is down - Serial 0/0/0 is up (disabled)
Serial 0/0/0 is down, line protocol is down
An internal corporate server can be accessed by internal PCs, but not by external Internet users that should have access. What could be the issue? - Static NAT has not been configured properly or at all. - The server does not have a private IP address assigned. - The switch port to which the server connects has an incorrect VLAN configured. - The default gateway router for the server does not have a default route.
Static NAT has not been configured properly or at all.
Refer to the exhibit. Which command or set of commands will configure SW_A to copy all traffic for the server to the packet analyzer? Sw_A(config)# monitor session 1 destination interface gi0/1 Sw_A(config)# monitor session 1 source interface fa0/1 Sw_A(config)# monitor session 1 source interface fa0/7 Sw_A(config)# monitor session 5 source interface gi0/1 Sw_A(config)# monitor session 5 destination interface fa0/7 Sw_A(config)# monitor session 1 destination interface fa0/7 Sw_A(config)# monitor session 5 source interface gi0/1 Sw_A(config)# monitor session 6 destination interface fa0/7
Sw_A(config)# monitor session 5 source interface gi0/1 Sw_A(config)# monitor session 5 destination interface fa0/7*
Match the transmission rate standards with their designated bandwidth. (Not all options are used.) T1 DS0 OC-1 E1 T3 1.544 Mb/s 64 Kb/s 51.84 Mb/s 2.048 Mb/s 44.736 Mb/s 512 Mb/s 6.312 Mb/s 155.54 Mb/s
T1 - 1.544 Mb/s DS0 - 64 Kb/s OC-1 - 51.84 Mb/s E1 - 2.048 Mb/s T3 - 44.736 Mb/s
Which two WAN infrastructure services are examples of private connections? (Choose two.) T1/E1 wireless DSL cable Frame Relay
T1/E1 frame relay
Which two protocols are used to provide server-based AAA authentication? (Choose two.) TACACS+ SSH RADIUS 802.1x SNMP
TACACS+, RADIUS
Refer to the exhibit. A network administrator configures a named ACL on the router. Why is there no output displayed when the show command is issued? The ACL is not activated. The ACL name is case sensitive. The ACL has not been applied to an interface. No packets have matched the ACL statements yet.
The ACL name is case sensitive.
The newly configured ASBR that connects a company to the Internet has a default route configured and has the default-information originate command entered. Devices connected through this router can access the Internet. The problem is that no other OSPF routers have a default route in the routing table and no other users throughout the organization can access the Internet. What could be the problem? - The ASBR does not have an OSPF neighbor. - The other routers are not configured to accept LSA type 4s. - The ASBR should use the exit_interface argument instead of next-hop on the default route. - The ASBR does not have OSPF configured.
The ASBR does not have an OSPF neighbor.
What are two characteristics of a PPPoE configuration on a Cisco customer router? (Choose two.) An MTU size of 1492 bytes is configured on the Ethernet interface. The PPP configuration is on the dialer interface. The customer router CHAP username and password are independent of what is configured on the ISP router. The Ethernet interface does not have an IP address. The dialer pool command is applied to the Ethernet interface to link it to the dialer interface.
The Ethernet interface does not have an IP address. The PPP configuration is on the dialer interface.
Refer to the exhibit. A network administrator is configuring an ACL to limit the connection to R1 vty lines to only the IT group workstations in the network 192.168.22.0/28. The administrator verifies the successful Telnet connections from a workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the cause of the connection failure? The login command has not been entered for vty lines. The enable secret password is not configured on R1. The permit ACE should specify protocol ip instead of tcp. The IT group network is included in the deny statement. The permit ACE specifies a wrong port number.
The IT group network is included in the deny statement.*
A networked PC is having trouble accessing the Internet, but can print to a local printer and ping other computers in the area. Other computers on the same network are not having any issues. What is the problem? - The link between the switch to which the PC connects and the default gateway router is down. - The PC has a missing or incorrect default gateway. - The default gateway router does not have a default route. - The switch port to which the PC connects has an incorrect VLAN configured.
The PC has a missing or incorrect default gateway.
A network administrator is configuring a PPP link with the commands: R1(config-if)# encapsulation ppp R1(config-if)# ppp quality 70 What is the effect of these commands? - The PPP link will be closed down if the link quality drops below 70 percent. - The NCP will send a message to the sending device if the link usage reaches 70 percent. - The LCP establishment phase will not start until the bandwidth reaches 70 percent or more. - The PPP link will not be established if more than 30 percent of options cannot be accepted.
The PPP link will be closed down if the link quality drops below 70 percent.
Which statement describes the RSPAN VLAN? The RSPAN VLAN can be used to carry secure traffic between switches. The RSPAN VLAN must be the same as the native VLAN. The RSPAN VLAN must be the same on both the source and destination switch. The RSPAN VLAN can be used for remote management of network switches.
The RSPAN VLAN must be the same on both the source and destination switch.*
Refer to the exhibit. A SNMP manager has IP address 172.16.1.120. The SNMP manager is unable to change configuration variables on the R1 SNMP agent. What could be the problem? The SNMP agent should have traps disabled. The IP address of the SNMP manager must be 172.16.1.1. The ACL of ACL_SNMP has not been implemented on an interface yet. The SNMP agent is not configured for write access.
The SNMP agent is not configured for write access.*
Refer to the exhibit. Which statement is true about the local SPAN configuration on switch SW1? - The SPAN session transmits to a device on port Fa3/21 a copy of all traffic that is monitored on port Fa3/1. - The SPAN session transmits to a device on port Fa3/21 a copy of all traffic that is monitored on port Fa3/1, but only if port Fa3/1 is configured in VLAN 10. - The SPAN session transmits to a device on port Fa3/21 a copy of all traffic that is monitored on port Fa3/1, but only if port Fa3/1 is configured as trunk. - The SPAN session transmits to a device on port Fa3/21 only a copy of unicast traffic that is monitored on port Fa3/1. All multicast and BPDU frames will be excluded from the monitoring process.
The SPAN session transmits to a device on port Fa3/21 a copy of all traffic that is monitored on port Fa3/1.
An EIGRP router loses the route to a network. Its topology table contains two feasible successors to the same network. What action will the router take? - The best alternative backup route is immediately inserted into the routing table. - The router uses the default route. - The DUAL algorithm is recomputed to find an alternate route. - The router will query neighbors for an alternate route.
The best alternative backup route is immediately inserted into the routing table.
A network engineer is troubleshooting the loss of MPEG video viewing quality as MPEG video files cross a PPP WAN link. What could be causing this loss of quality? - The compress command was used when PPP was configured on the interfaces. - PAP authentication was misconfigured on the link interfaces. - Link Quality Monitoring was not configured correctly on each interface. - The clock rates configured on each serial interface do not match.
The compress command was used when PPP was configured on the interfaces.
How is the control plane modified to operate with network virtualization? - The control plane function is consolidated into a centralized controller. - The control plane on each device is interconnected to a dedicated high-speed network. - A hypervisor is installed in each device to allow multiple instances of the control plane. - Control plane redundancy is added to each network device.
The control plane function is consolidated into a centralized controller.
Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.) This tunnel mode does not support IP multicast tunneling. This tunnel mode provides encryption. This tunnel mode is not the default tunnel interface mode for Cisco IOS software. The data that is sent across this tunnel is not secure. A GRE tunnel is being used.
The data that is sent across this tunnel is not secure. A GRE tunnel is being used.
Refer to the exhibit. A tunnel was implemented between routers R1 and R2. Which two conclusions can be drawn from the R1 command output? (Choose two.) This tunnel mode does not support IP multicast tunneling. This tunnel mode provides encryption. This tunnel mode is not the default tunnel interface mode for Cisco IOS software. The data that is sent across this tunnel is not secure. A GRE tunnel is being used.
The data that is sent across this tunnel is not secure. A GRE tunnel is being used.
Which two statements describe the effect of the access control list wildcard mask 0.0.0.15? (Choose two.) The last five bits of a supplied IP address will be ignored. The first 28 bits of a supplied IP address will be matched. The first 28 bits of a supplied IP address will be ignored. The last four bits of a supplied IP address will be matched. The last four bits of a supplied IP address will be ignored. The first 32 bits of a supplied IP address will be matched.
The first 28 bits of a supplied IP address will be matched. The last four bits of a supplied IP address will be ignored.
A client calls the support desk and says this to a technician: "I have just started my computer and attempted to check e-mail. The error 0x800ccc0d was displayed. However, I was able to connect to network drives and access the Internet." Which statement would describe the status of this issue? - The client needs to plug into a different port on the switch and try the steps again before contacting the helpdesk. - More detail is required before a complete problem description can be completed. - The client needs to reboot the PC and report back to the helpdesk. - The helpdesk has enough information to begin finding a resolution. - The client needs to switch cables before the helpdesk can begin to resolve the issue.
The helpdesk has enough information to begin finding a resolution.
What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture? - The leaf switches always attach to the spines and they are interlinked through a trunk line. - The leaf switches always attach to the spines, but they never attach to each other. - The spine switches attach to the leaf switches and attach to each other for redundancy. - The spine and leaf switches are always linked through core switches.
The leaf switches always attach to the spines, but they never attach to each other.
What happens when the memory queue of a device fills up and new network traffic is received? - The network device sends the received traffic immediately. - The network device will drop the arriving packets. - The network device drops all traffic in the queue. - The network device queues the received traffic while sending previously received traffic.
The network device will drop the arriving packets.
http://www.ccna5blog.com/uploads/img/ccna4chapter3examanswerv5038v5022015100-2.png Refer to the exhibit. A network administrator is configuring the PPP link between the two routers. However, the PPP link cannot be established. Based on the partial output of the show running-config command, what is the cause of the problem? - The usernames do not match. - The interface IP addresses are in different subnets. - The passwords do not match. - The passwords should be longer than 8 characters.
The passwords do not match.
How does a Cisco router using tail drop handle congestion when a traffic queue becomes full? The router will remove the most recent data placed in the queue to make space for an arriving packet. The router will remove the packet in the front of the queue, move all other packets forward, and insert the just arrived packet at the end. The router will only drop non delay-sensitive data that is close to the end of the queue. The router will drop any packet that arrives at the end of the queue.
The router will drop any packet that arrives at the end of the queue.*
What is the behavior of a switch as a result of a successful CAM table attack? The switch will shut down. The switch will forward all received frames to all other ports. The switch will drop all received frames. The switch interfaces will transition to the error-disabled state.
The switch will forward all received frames to all other ports.*
For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model? - Data traffic from clients will be routed to multiple virtual servers. - There are significant data exchanges between virtual servers. - There is more data traffic flowing from virtual servers to clients. - More network control traffic is generated between virtual servers and clients.
There are significant data exchanges between virtual servers.
Refer to the exhibit. Router R1 was configured by a network administrator to use SNMP version 2. The following commands were issued: R1(config)# snmp-server community batonaug ro SNMP_ACL R1(config)# snmp-server contact Wayne World R1(config)# snmp-server host 192.168.1.3 version 2c batonaug R1(config)# ip access-list standard SNMP_ACL R1(config-std-nacl)# permit 192.168.10.3 Why is the administrator not able to get any information from R1? The snmp-server location command is missing. The snmp-server enable traps command is missing. There is a problem with the ACL configuration. The snmp-server community command needs to include the rw keyword.
There is a problem with the ACL configuration.*
Which statement describes a characteristic of standard IPv4 ACLs? They are configured in the interface configuration mode. They filter traffic based on source IP addresses only. They can be created with a number but not with a name. They can be configured to filter traffic based on both source IP addresses and source ports.
They filter traffic based on source IP addresses only.
Which connectivity method would be best for a corporate employee who works from home two days a week, but needs secure access to internal corporate databases? WiMAX VPN cable DSL
VPN
Which public WAN technology provides security by using encrypted tunnels over Internet connections? 3G/4G DSL VPN cable
VPN
How can the use of VPNs in the workplace contribute to lower operating costs? VPNs prevents connectivity to SOHO users. VPNs require a subscription from a specific Internet service provider that specializes in secure connections. High-speed broadband technology can be replaced with leased lines. VPNs can be used across broadband connections rather than dedicated WAN links.
VPNs can be used across broadband connections rather than dedicated WAN links.
Which solution can provide Internet access to remote locations where no regular WAN services are available? VSAT municipal Wi-Fi Ethernet WiMAX
VSAT
What are two characteristics of voice traffic? (Choose two.) Voice traffic requires at least 384 kbs of bandwidth. Voice traffic latency should not exceed 150 ms. Voice traffic is unpredictable and inconsistent. Voice traffic consumes lots of network resources. Dropped voice packets are not retransmitted.
Voice traffic latency should not exceed 150 ms. Dropped voice packets are not retransmitted.
Which statement describes a characteristic of a WAN? - All serial links are considered WAN connections. - A WAN provides end-user network connectivity to the campus backbone. - A WAN operates within the same geographic scope of a LAN, but has serial links. - WAN networks are owned by service providers.
WAN networks are owned by service providers.
What is a characteristic of a WAN? - A WAN is typically owned by an enterprise which wants to interconnect its LANs. - WAN service providers include carriers such as a telephone network or satellite service. - WANs always use physical cables to connect LANs. - A WAN operates inside the geographic scope of a LAN.
WAN service providers include carriers such as a telephone network or satellite service.
A network engineer is selecting a QoS method to control congestion on a VPN tunnel link between the headquarters site and a branch office. Which queuing method cannot be used to classify and control VPN traffic? FIFO LLQ WFQ CBWFQ
WFQ
A network technician is troubleshooting an email connection problem. Which question to the end-user will provide clear information to better define the problem? - What kind of equipment are you using to send emails? - Is your email working now? - How big are the emails you tried to send? - When did you first notice your email problem?
When did you first notice your email problem?
A home user lives within 10 miles (16 kilometers) of the Internet provider network. Which type of technology provides high-speed broadband service with wireless access for this home user? DSL 802.11 WiMAX municipal Wi-Fi
WiMAX
Refer to the exhibit. What solution can provide a VPN between site A and site B to support encapsulation of any Layer 3 protocol between the internal networks at each site? Cisco SSL VPN a remote access tunnel an IPsec tunnel a GRE tunnel
a GRE tunnel
A small company with 10 employees uses a single LAN to share information between computers. Which type of connection to the Internet would be appropriate for this company? - private dedicated lines through their local service provider - a dialup connection that is supplied by their local telephone service provider - a broadband service, such as DSL, through their local service provider - Virtual Private Networks that would enable the company to connect easily and securely with employees
a broadband service, such as DSL, through their local service provider
Which cloud model provides services for a specific organization or entity? a hybrid cloud a public cloud a community cloud a private cloud
a private cloud
What is an example of an M2M connection? - a person getting information from a database, or conducting a complex analysis - two people communicating with each other through an instant messaging application - a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system for the sanitation truck to adjust its route for pickups - a domestic refrigerator sending an email to homeowners to inform them that milk must be purchased
a sensor in a garbage can signaling that it is full and delivering the data to a GPS mapping system for the sanitation truck to adjust its route for pickups
Which address is used in the Address field of a PPP frame? - a single byte of binary 00000000 - a single byte of binary 11111111 - a single byte of binary 10101010 - the IP address of the serial interface
a single byte of binary 11111111
What two ACEs could be used to deny IP traffic from a single source host 10.1.1.1 to the 192.168.0.0/16 network? (Choose two.) access-list 100 deny ip 192.168.0.0 0.0.255.255 10.1.1.1 255.255.255.255 access-list 100 deny ip 10.1.1.1 0.0.0.0 192.168.0.0 0.0.255.255 access-list 100 deny ip 192.168.0.0 0.0.255.255 10.1.1.1 0.0.0.0 access-list 100 deny ip host 10.1.1.1 192.168.0.0 0.0.255.255 access-list 100 deny ip 192.168.0.0 0.0.255.255 host 10.1.1.1 access-list 100 deny ip 10.1.1.1 255.255.255.255 192.168.0.0 0.0.255.255
access-list 100 deny ip 10.1.1.1 0.0.0.0 192.168.0.0 0.0.255.255* access-list 100 deny ip host 10.1.1.1 192.168.0.0 0.0.255.255*
Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet? access-list 103 permit 192.168.10.0 0.0.0.255 host 172.17.80.1 access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq telnet access-list 103 permit tcp 192.168.10.0 0.0.0.255 any eq 80 access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23 access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80 access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23 access-list 103 deny tcp host 192.168.10.0 any eq 23 access-list 103 permit tcp host 192.168.10.1 eq 80
access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80 access-list 103 deny tcp 192.168.10.0 0.0.0.255 any eq 23*
Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.) access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any R1(config)# interface s0/0/0 R1(config-if)# ip access-group 105 out access-list 105 permit tcp host 10.0.54.5 any eq www access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 R2(config)# interface gi0/0 R2(config-if)# ip access-group 105 in access-list 105 permit ip host 10.0.70.23 host 10.0.54.5 access-list 105 permit tcp any host 10.0.54.5 eq www access-list 105 permit ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out
access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any* R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out
Which two ACE commands will block traffic that is destined for a web server which is listening to default ports? (Choose two.) access-list 110 deny tcp any any lt 80 access-list 110 deny tcp any any eq 21 access-list 110 deny tcp any any eq https access-list 110 deny tcp any any gt 75 access-list 110 deny tcp any any gt 443
access-list 110 deny tcp any any eq https* access-list 110 deny tcp any any gt 75*
What three services are provided by the AAA framework? (Choose three.) accounting automation authorization authentication autobalancing autoconfiguration
accounting, authorization, authentication
Which feature is unique to IPv6 ACLs when compared to those of IPv4 ACLs? the use of wildcard masks the use of named ACL ACE an implicit permit of neighbor discovery packets an implicit deny any any ACE
an implicit permit of neighbor discovery packets*
Users report that their PCs cannot access the file server that is located in the server farm at the headquarters building. The support desk technician checks the latest network update reports and realizes that the router that was connected to the network segment of those users failed suddenly and has just been replaced. What command should the technician instruct the users to issue on the PCs to solve the problem? arp -a arp -d ipconfig /renew ipconfig /flushdns
arp -d
When is the most appropriate time to measure network operations to establish a network performance baseline? - at random times during a 10 week period, so that abnormal traffic levels can be detected - during quiet vacation periods, so that the level of non-data traffic can be determined - whenever high network use is detected, so that how the network performs under stress can be monitored - at the same time each day across a set period of average working days, so that typical traffic patterns can be established
at the same time each day across a set period of average working days, so that typical traffic patterns can be established
What is used by BGP to determine the best path to a destination? cost attributes administrative distance hop count
attributes
Which additional functionality is available on an interface when the encapsulation is changed from HDLC to PPP? flow control error control authentication synchronous communication
authentication
Match the broadband characteristic to the broadband type. bandwidth is shared by many users bandwidth is distance sensitive area of coverage is limited to 1-2 km ultimate high bandwidth solution cable DSL WiMax fiber-to-the-home
bandwidth is shared by many users - cable bandwidth is distance sensitive - DSL area of coverage is limited to 1-2 km - WiMax ultimate high bandwidth solution - fiber-to-the-home
Which model is the only QoS model with no mechanism to classify packets? IntServ DiffServ best-effort hard QoS
best-effort
Fill in the blank. Network performance is measured by the number of __________ per second that can be transmitted
bits
Which troubleshooting method begins by examining cable connections and wiring issues? divide-and-conquer top-down bottom-up substitution
bottom-up
How does PPP interface with different network layer protocols? - by using separate NCPs - by encoding the information field in the PPP frame - by specifying the protocol during link establishment through LCP - by negotiating with the network layer handler
by using separate NCPs
Which troubleshooting tool can be used to pinpoint the distance to a break in a network cable? digital multimeter network analyzer network analysis module cable tester
cable tester
What are two characteristics of DiffServ QoS model? (Choose two.) can divide network traffic into classes based on business requirements uses the Resource Reservation Protocol (RSVP) to signal QoS requirements the easiest QoS model to deploy groups all TCP flows into a single class delivers end to end QoS
can divide network traffic into classes based on business requirements* groups all TCP flows into a single class
A team of engineers has identified a solution to a significant network problem. The proposed solution is likely to affect critical network infrastructure components. What should the team follow while implementing the solution to avoid interfering with other processes and infrastructure? - one of the layered troubleshooting approaches - change-control procedures - knowledge base guidelines - syslog messages and reports
change-control procedures
Which three network models are described in the fog computing pillar of the Cisco IoT System? (Choose three.) enterprise WAN P2P peer-to-peer client/server cloud computing fog computing
client/server cloud computing fog computing
Which SNMPv2 configuration step is required? - documenting the location of the system contact - configuring the community string and access level - restricting SNMP access to NMS hosts - enabling traps on an SNMP agent
configuring the community string and access level
Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network? data plane control plane adjacency table forwarding information base
control plane
When preparing an IoT implementation, what type of network will devices be connected to in order to share the same infrastructure and facilitate communications, analytics, and management? telephone converged video VoIP
converged
A user reports that after an OS patch of the networking subsystem has been applied to a workstation, it performs very slowly when connecting to network resources. A network technician tests the link with a cable analyzer and notices that the workstation sends an excessive number of frames smaller than 64 bytes and also other meaningless frames. What is the possible cause of the problem? - Ethernet signal attenuation - corrupted application installation - cabling faults - corrupted NIC driver
corrupted NIC driver
Match each component of a WAN connection to its description. (Not all options are used.) customer premises equipment demarcation point data terminal equipment data communications equipment - devices and inside wiring that are located on the enterprise edge and connect to a carrier link - a point that is established in a building or complex to separate customer equipment from service provider equipment - customer devices that pass the data from a customer network or host computer for transmission over the WAN - devices that put data on the local loop
customer premises equipment - devices and inside wiring that are located on the enterprise edge and connect to a carrier link demarcation point - a point that is established in a building or complex to separate customer equipment from service provider equipment data terminal equipment - customer devices that pass the data from a customer network or host computer for transmission over the WAN data communications equipment - devices that put data on the local loop
A corporation is looking for a solution to connect multiple, newly established remote branch offices. Which consideration is important when selecting a private WAN connection rather than a public WAN connection? - higher data transmission rate - website and file exchange service support - lower cost - data security and confidentiality during transmission
data security and confidentiality during transmission
Fill in the blank. When _________-sensitive traffic is being sent, it should be classified and marked as close to the source as possible.
delay
When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.) jitter packet routing packet addressing delay link speed
delay* jitter*
Which three implicit access control entries are automatically added to the end of an IPv6 ACL? (Choose three.) deny ip any any deny ipv6 any any permit ipv6 any any deny icmp any any permit icmp any any nd-ns permit icmp any any nd-na
deny ipv6 any any permit icmp any any nd-ns permit icmp any any nd-na
What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? destination IP address destination MAC address Ethernet type source IP address source MAC address
destination MAC address
Which two packet filters could a network administrator use on an IPv4 extended ACL? (Choose two.) ICMP message type destination UDP port number destination MAC address computer type source TCP hello address
destination UDP port number* ICMP message type*
When PPPoE is configured on a customer router, which two commands must have the same value for the configuration to work? (Choose two.) ppp chap hostname 2 interface dialer 2 pppoe-client dial-pool-number 2 ppp chap password 2 dialer pool 2 interface gigabitethernet 0/2
dialer pool 2 pppoe-client dial-pool-number 2
A network engineer is troubleshooting a network that has recently been updated with a new routing protocol, but the network is not working as expected. The engineer is comparing the running configuration from before and after the change was made. Which approach to troubleshooting the problem is the engineer using? - comparing IP settings on network devices - divide-and-conquer - bottom-up - top-down
divide-and-conquer
Which is a characteristic of a Type 2 hypervisor? - does not require management console software - installs directly on hardware - has direct access to server hardware resources - best suited for enterprise environments
does not require management console software
When should a network performance baseline be measured? - during normal work hours of an organization - immediately after the main network devices restarted - after normal work hours to reduce possible interruptions - when a denial of service attack to the network is detected and blocked
during normal work hours of an organization
Which three pairs of trunking modes will establish a functional trunk link between two Cisco switches? (Choose three.) dynamic desirable - dynamic desirable access - trunk dynamic desirable - trunk dynamic desirable - dynamic auto dynamic auto - dynamic auto access - dynamic auto
dynamic desirable - dynamic auto dynamic desirable - dynamic desirable dynamic desirable - trunk
Which term describes the data exchanges between virtual servers in a data center? vertical traffic backbone traffic east-west traffic north-south traffic
east-west traffic
In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.) bandwidth size of the network signal modulation technique crosstalk electromagnetic interference
electromagnetic interference crosstalk
True or False. Cloud computing and virtualization are different terms that refer to the same thing.
false
Which medium do service providers use to transmit data over WAN connections with SONET, SDH, and DWDM? fiber optic satellite Wi-Fi copper
fiber optic
Which broadband technology would be best for a small office that requires fast upstream connections? DSL WiMax fiber-to-the-home cable
fiber-to-the-home
Match the PPP frame field to the description. (Not all options are used.) - a single byte that designates the beginning or end of a PPP frame - a byte filled with all 1s - a field with 00000011 so that data link establishment is not required - one (if compression allowed) or two bytes - 0 to 1500 bytes of information - up to 4 bytes for error detection flag address control protocol data frame check sequence destination MAC
flag - a single byte that designates the beginning or end of a PPP frame address - a byte filled with all 1s control - a field with 00000011 so that data link establishment is not required protocol - one (if compression allowed) or two bytes data - 0 to 1500 bytes of information frame check sequence - up to 4 bytes for error detection
What three services are provided by the transport layer? (Choose three.) bit transmission error recovery encryption of data flow control connection establishment data representation path determination
flow control error recovery connection establishment
Which pillar of the Cisco IoT System allows data to be analyzed and managed at the location where it is generated? application enhancement platform fog computing data analytics network connectivity
fog computing
Which IoT pillar extends cloud connectivity closer to the network edge? - management and automation pillar - application enablement platform pillar - network connectivity pillar - fog computing pillar
fog computing pillar
A network engineer is troubleshooting a network problem and can successfully ping between two devices. However, Telnet between the same two devices does not work. Which OSI layers should the administrator investigate next? - from the network layer to the application layer - from the network layer to the physical layer - only the network layer - all of the layers
from the network layer to the application layer
After which step in the network troubleshooting process would one of the layered troubleshooting methods be used? - documenting symptoms - determining ownership - narrowing the scope - gathering symptoms from suspect devices
gathering symptoms from suspect devices
Which mode is used to configure SNMP? - privileged mode - global configuration mode - interface configuration mode - router configuration mode
global configuration mode
What is a disadvantage of leased lines? low quality inconsistent availability complexity high cost
high cost
Which two keywords can be used in an access control list to replace a wildcard mask or address and wildcard mask pair? (Choose two.) most host all any some gt
host, any
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-25_222537.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-25_222537-1.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-27_160906.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-27_dfdf160906.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-27_161137.jpg
https://ccnav6.com/wp-content/uploads/2017/07/2017-07-27_dfdffdg161137.jpg
Fill in the blank. A ______________ is software that creates and runs VM instances and can be installed directly on hardware or run as an application on an OS.
hypervisor
Under which condition does congestion occur on a converged network with voice, video, and data traffic? - if the request for bandwidth exceeds the amount of bandwidth available - if video traffic requests more bandwidth than voice traffic requests - if voice traffic latency begins to decrease across the network - if a user downloads a file that exceeds the file limitation that is set on the server
if the request for bandwidth exceeds the amount of bandwidth available
Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company? infrastructure as a service (IaaS) browser as a service (BaaS) software as a service (SaaS) wireless as a service (WaaS)
infrastructure as a service (IaaS)
Which is a characteristic of a Type 1 hypervisor? - installed on an existing operating system - installed directly on a server - best suited for consumers and not for an enterprise environment - does not require management console software
installed directly on a server
A network engineer is troubleshooting an unsuccessful PPP multilink connection between two routers. The multilink interface has been created and assigned a number, the interface has been enabled for multilink PPP, and the interface has been assigned a multilink group number that matches the group assigned to the member physical serial interfaces. The physical serial interfaces have also been enabled for PPP multilink. Which additional command should to be issued on the multilink interface? no ip address ip address 192.168.10.1 255.255.255.252 encapsulation ppp clock rate 4000000
ip address 192.168.10.1 255.255.255.252
A group of Windows PCs in a new subnet has been added to an Ethernet network. When testing the connectivity, a technician finds that these PCs can access local network resources but not the Internet resources. To troubleshoot the problem, the technician wants to initially confirm the IP address and DNS configurations on the PCs, and also verify connectivity to the local router. Which three Windows CLI commands and utilities will provide the necessary information? (Choose three.) telnet netsh interface ipv6 show neighbor ipconfig arp -a tracert nslookup ping
ipconfig nslookup ping
Which command is used to activate an IPv6 ACL named ENG_ACL on an interface so that the router filters traffic prior to accessing the routing table? ipv6 traffic-filter ENG_ACL in ipv6 traffic-filter ENG_ACL out ipv6 access-class ENG_ACL out ipv6 access-class ENG_ACL in
ipv6 traffic-filter ENG_ACL in*
A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value? priority latency bandwidth jitter
latency
Which WAN technology establishes a dedicated constant point-to-point connection between two sites? ISDN ATM Frame Relay leased lines
leased lines
Which three are types of LCP frames used with PPP? (Choose three.) link-termination frames link-control frames link-maintenance frames link-negotiation frames link-acknowledgment frames link-establishment frames
link-termination frames link-maintenance frames link-establishment frames
When applied to a router, which command would help mitigate brute-force password attacks against the router? - service password-encryption - login block-for 60 attempts 5 within 60 - banner motd $Max failed logins = 5$ - exec-timeout 30
login block-for 60 attempts 5 within 60
Which geographic scope requirement would be considered a distributed WAN scope? one-to-many regional one-to-one local global many-to-many
many-to-many
A network administrator is analyzing the features supported by the multiple versions of SNMP. What are two features that are supported by SNMPv3 but not by SNMPv1 or SNMPv2c? (Choose two.) SNMP trap mechanism message source validation bulk retrieval of MIB information message encryption community-based security
message source validation message encryption
What is the function of the DSLAM in a broadband DSL network? multiplexes individual customer DSL connections into a single upstream link separates voice from data signals communicates directly with customer cable modems to provide Internet services to customers separates POTS traffic from ADSL traffic
multiplexes individual customer DSL connections into a single upstream link
Which broadband wireless technology is based on the 802.11 standard? CDMA WiMAX UMTS municipal Wi-Fi
municipal Wi-Fi
What is the only type of ACL available for IPv6? named standard named extended numbered standard numbered extended
named extended
A network administrator is having issues with a newly installed network not appearing in other routers. At which layer of the OSI model is the network administrator going to start the troubleshooting process when using a top-down approach? internet network session transport application
network
Which category of software troubleshooting tools provides device-level monitoring, configuration, and fault-management? - network management system tools - knowledge bases - baselining tools - host-based protocol analyzers
network management system tools
An attack has been launched within a company and a host name has been identified as the source. What command can a network technician use to determine the IP address assigned to the host name? ipconfig /all net computer nslookup tracert
nslookup
What can cause a reduction in available bandwidth on a cable broadband connection? - smaller cells - committed information rate - distance from the central office of the provider - number of subscribers
number of subscribers
When configuring Multilink PPP, where is the IP address for the multilink bundle configured? - on a physical serial interface - on a physical Ethernet interface - on a subinterface - on a multilink interface
on a multilink interface
Where is PPPoE configured on a Cisco router? on the dialer interface on a serial interface on an Ethernet interface on any physical interface
on the dialer interface
Which cybersecurity solution is described in the security pillar of the Cisco IoT System to address the security of power plants and factory process lines? - operational technology specific security - IoT physical security - cloud computing security - IoT network security
operational technology specific security
Which is an advantage of using PPP on a serial link instead of HDLC? - option for authentication - option for session establishment - higher speed transmission - fixed-size frames
option for authentication
Which two functions are primary functions of a router? (Choose two.) domain name resolution path selection flow control microsegmentation packet forwarding
path selection packet forwarding
Which IPv6 ACL command entry will permit traffic from any host to an SMTP server on network 2001:DB8:10:10::/64? permit tcp host 2001:DB8:10:10::100 any eq 25 permit tcp any host 2001:DB8:10:10::100 eq 25 permit tcp host 2001:DB8:10:10::100 any eq 23 permit tcp any host 2001:DB8:10:10::100 eq 23
permit tcp any host 2001:DB8:10:10::100 eq 25
A new corporation needs a data network that must meet certain requirements. The network must be fast and reliable to transmit secure video conferencing calls between two branches. If cost is not a consideration, which two types of WAN infrastructure would best meet the requirements? (Choose two.) public infrastructure private infrastructure Internet dedicated switched
private infrastructure dedicated
A company is setting up a web site with SSL technology to protect the authentication credentials required to access the web site. A network engineer needs to verify that the setup is correct and that the authentication is indeed encrypted. Which tool should be used? fault-management tool cable analyzer protocol analyzer baselining tool
protocol analyzer
A corporation is searching for an easy and low cost solution to provide teleworkers with a secure connection to headquarters. Which solution should be selected? site-to-site VPN over the Internet remote access VPN over the Internet dial-up connection leased line connection
remote access VPN over the Internet
Which two devices allow hosts on different VLANs to communicate with each other? (Choose two.) Layer 2 switch Layer 3 switch router hub repeater
router Layer 3 switch
A construction firm is building a power plant at a remote and isolated mine site and needs to connect the data network of the plant to the corporate network. Which public technology is the most suitable to meet the connection needs? WiMax satellite Internet Municipal Wi-Fi DSL
satellite internet
Which statement describes the concept of cloud computing? - separation of control plane from data plane - separation of operating system from hardware - separation of management plane from control plane - separation of application from hardware
separation of application from hardware
Which QoS technique retains excess packets in a separate queue for later transmission? shaping classifying marking queuing
shaping
When a PPPoE configuration is being verified, which command can be used to verify the MTU size and encapsulation type configured on a Cisco router? show ip interface brief show ip route show interface dialer 1 show pppoe session
show interface dialer 1
Which command runs several other show commands in order to generate many pages of detailed troubleshooting information? show ip cache show protocols show tech-support show running-config
show tech-support
Fill in the blank. Branch office networks and corporate headquarter networks can be connected together using __________ VPN connections through the Internet infrastructure.
site-to-site
What are the two types of VPN connections? (Choose two.) PPPoE site-to-site leased line Frame Relay remote access
site-to-site remote access
DHCP __________ is a mitigation technique to prevent rogue DHCP servers from providing false IP configuration parameters.
snooping
What is an SNMP management agent? - a computer loaded with management software and used by an administrator to monitor a network - a database that a device keeps about network performance - software that is installed on devices managed by SNMP - a communication protocol that is used by SNMP
software that is installed on devices managed by SNMP
Which three values or sets of values are included when creating an extended access control list entry? (Choose three.) access list number between 100 and 199 default gateway address and wildcard mask access list number between 1 and 99 destination subnet mask and wildcard mask destination address and wildcard mask source subnet mask and wildcard mask source address and wildcard mask
source address and wildcard mask destination address and wildcard mask access list number between 100 and 199
What is an advantage offered by GRE tunnels? built in security mechanisms encryption of encapsulated traffic support for IP multicast tunneling support for connecting individual hosts across the Internet
support for IP multicast tunneling
How does virtualization help with disaster recovery within a data center? - guarantee of power - improvement of business practices - supply of consistent air flow - support of live migration
support of live migration
What component is considered the brains of the ACI architecture and translates application policies? - the Application Network Profile endpoints - the hypervisor - the Application Policy Infrastructure Controller - the Nexus 9000 switch
the Application Policy Infrastructure Controller
What device is considered a supplicant during the 802.1X authentication process? the client that is requesting authentication the router that is serving as the default gateway the switch that is controlling network access the authentication server that is performing client authentication
the client that is requesting authentication
Users are reporting longer delays in authentication and in accessing network resources during certain time periods of the week. What kind of information should network engineers check to find out if this situation is part of a normal network behavior? - the network performance baseline - syslog records and messages - debug output and packet captures - network configuration files
the network performance baseline
Which criterion is preferred by the router to choose a router ID? - the router-id rid command - the IP address of the highest active interface on the router - the IP address of the highest configured loopback interface on the router - the IP address of the highest active OSPF-enabled interface
the router-id rid command
What pre-populates the FIB on Cisco devices that use CEF to process packets? the ARP table the adjacency table the routing table the DSP
the routing table
Which information does a switch use to keep the MAC address table information current? - the source MAC address and the incoming port - the destination MAC address and the outgoing port - the source and destination MAC addresses and the incoming port - the source MAC address and the outgoing port - the source and destination MAC addresses and the outgoing port - the destination MAC address and the incoming port
the source MAC address and the incoming port
A user in a large office calls technical support to complain that a PC has suddenly lost connectivity to the network. The technician asks the caller to talk to nearby users to see if other machines are affected. The caller reports that several immediate neighbors in the same department have a similar problem and that they cannot ping each other. Those who are seated in other departments have connectivity. What should the technician check as the first step in troubleshooting the issue? - the status of the departmental workgroup switch in the wiring closet - the trunks between switches in the wiring closet - the cable that connects the PC of the caller to the network jack - the power outlet to the PC that is used by the caller - the cable connection between a PC and a network outlet that is used by a neighbor
the status of the departmental workgroup switch in the wiring closet
When using 802.1X authentication, what device controls physical access to the network, based on the authentication status of the client? the router that is serving as the default gateway the supplicant the switch that the client is connected to the authentication server
the switch that the client is connected to
Why is the MTU for a PPPoE DSL configuration reduced from 1500 bytes to 1492? to accommodate the PPPoE headers to reduce congestion on the DSL link to enable CHAP authentication to establish a secure tunnel with less overhead
to accommodate the PPPoE headers
What are two reasons a company would use a VPN? (Choose two.) to increase bandwidth to the network to connect remote users to the network to test network connections to remote users to allow suppliers to access the network to eliminate the need of having a gateway
to connect remote users to the network to allow suppliers to access the network
For classifying packets into classes with CBWFQ, what is the purpose of configuring a maximum packet limit for a class? to control the maximum number of packets allowed to be discarded to control the maximum number of packets that can be received each second on an ingress interface to control the maximum number of packets that can be forwarded each second on an egress interface to control the maximum number of packets allowed in a single queue
to control the maximum number of packets allowed in a single queue*
A network administrator issues the telnet www.cisco.com 25 command on the workstation. What is the purpose of this command? - to verify that the website is operational - to establish a management session to the web server - to probe the server that provides the web service to determine if it is also running an email service - to identify the path of network traffic toward the web server
to probe the server that provides the web service to determine if it is also running an email service
What is the function of the MIB element as part of a network management system? to change configurations on SNMP agents to collect data from SNMP agents to send and retrieve network management information to store data about a device
to store data about a device*
A network engineer is troubleshooting a network problem where users cannot access the FTP server at the same IP address where a website can be successfully accessed. Which troubleshooting method would be the best to apply in this case? - comparing IP settings on user workstations - top-down - bottom-up - divide-and-conquer
top-down
Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used? traffic policing classification and marking weighted random early detection traffic shaping
traffic policing*
In applying an ACL to a router interface, which traffic is designated as outbound? traffic that is going from the destination IP address into the router traffic that is leaving the router and going toward the destination host traffic for which the router can find no routing table entry traffic that is coming from the source IP address into the router
traffic that is leaving the router and going toward the destination host*
Which two components are needed to provide a DSL connection to a SOHO? (Choose two.) transceiver DSLAM CMTS CM PPPoE enabled switch
transceiver, DSLAM
Users report that the new web site http://www.company1.biz cannot be accessed. The helpdesk technician checks and verifies that the web site can be accessed with http://www.company1.biz:90. Which layer in the TCP/IP model is involved in troubleshooting this issue? network access transport internet application
transport
True or False? In the 802.1X standard, the client attempting to access the network is referred to as the supplicant.
true
True or False? Network traffic can be marked at both Layer 2 and Layer 3 for QoS..
true
Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance? type 2 type 1 virtual machine bare metal
type 2
Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.) type of traffic amount of traffic cost of the link security needs distance between sites reliability
type of traffic amount of traffic security needs
What are SNMP trap messages? messages that are sent periodically by the NMS to the SNMP agents that reside on managed devices to query the device for data unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network messages that are used by the NMS to query the device for data messages that are used by the NMS to change configuration variables in the agent device
unsolicited messages that are sent by the SNMP agent and alert the NMS to a condition on the network*
What are two types of switch ports that are used on Cisco switches as part of the defense against DHCP spoofing attacks? (Choose two.) unknown port untrusted port unauthorized port trusted DHCP port authorized DHCP port established DHCP port
untrusted port trusted DHCP port
Which type of traffic does Cisco recommend be placed in the strict priority queue (PQ) when low latency queuing (LLQ) is being used? video data voice management
voice
In QoS models, which type of traffic is commonly provided the most preferential treatment over all other application traffic? web traffic voice traffic file transfers email
voice traffic
Which QoS technology provides congestion avoidance by allowing TCP traffic to be throttled before buffers become full and tail drops occur? weighted random early detection first-in, first-out traffic policing best-effort
weighted random early detection*
Which circumstance would result in an enterprise deciding to implement a corporate WAN? - when the enterprise decides to secure its corporate LAN - when the network will span multiple buildings - when the number of employees exceeds the capacity of the LAN - when its employees become distributed across many branch locations
when its employees become distributed across many branch locations
In which situation would the use of PAP be preferable to the use of CHAP? - when a network administrator prefers it because of ease of configuration - when multilink PPP is used - when plain text passwords are needed to simulate login at the remote host - when router resources are limited
when plain text passwords are needed to simulate login at the remote host