CCNA Sem 3 Set 2 Of 6, CCNA Semester 3 Set 6 Of 6 , CCNA Semester 3 Set 5 Of 6, CCNA Semester 3 Set 4 Of 6, CCNA Semester 3 Set 3 Of 6, CCNA Sem 3 Set 1 Of 6

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

179. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use hacking operation systems? to detect any evidence of a hack or malware in a computer or network to obtain specially designed operating systems preloaded with tools optimized for hacking to encode data, using algorithm schemes, to prevent unauthorized access to the encrypted data to reverse engineer binary files when writing exploits and when analyzing malware

to obtain specially designed operating systems preloaded with tools optimized for hacking

72. What are two purposes of launching a reconnaissance attack on a network? (Choose two.) -to scan for accessibility -to retrieve and modify data -to gather information about the network and devices -to prevent other users from accessing the system -to escalate access privileges

to scan accessibility to gather information about the network devices

190. Which OSPF table is identical on all converged routers within the same OSPF area? routing neighbor adjacency topology

topology

195. What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy? policing traffic marking weighted random early detection (WRED) traffic shaping tail drop

traffic marking

80. Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used? -traffic shaping -weighted random early detection -classification and marking -traffic policing

traffic policing

207. What type of traffic is described as requiring at least 384 Kbps of bandwidth? voice data video

video

What type of traffic is described as tending to be unpredictable, inconsistent, and bursty? video voice data

video

175. ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement? dedicated servers software defined networking virtualization Cisco ACI

virtualization

181. To avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement? data center cloud services virtualization dedicated servers

virtualization

194. What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects? voice video data

voice

166. Match the functions to the corresponding layers.

..

193. Match each component of a WAN connection to its description. (Not all options are used.)

..

47. An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement? -0.0.15.255 -0.0.3.255 -0.0.7.255 -0.0.1.255

0.0.3.255

162. Refer to the exhibitIf no router ID was manually configured, what would router Branch1 use as its OSPF router ID? 10.0.0.1 10.1.0.1 192.168.1.100 209.165.201.1

192.168.1.100

49. Refer to the exhibit. What is the OSPF cost to reach the West LAN 172.16.2.0/24 from East?​ -782 -74 -128 -65

65

124. Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting, what service or technology would support requirement? -Cloud services -Data center -APIC-EM -Cisco ACI

Cloud services

44. An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this? -TCP SYN flood -DNS tunneling -DHCP spoofing -ARP cache poisoning

DHCP spoofing

42. What are two syntax rules for writing a JSON array? (Choose two.) -Each value in the array is separated by a comma. -The array can include only one value type. -A space must separate each value in the array. -A semicolon separates the key and list of values. -Values are enclosed in square brackets.

Each value in the array is separated by a comma. Values are enclosed in square brackets.

79. A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended? -Frame Relay -Ethernet WAN -VSAT -ISDN

Ethernet WAN

163. Match the HTTP method with the RESTful operation.

GET - read POST - create PUT/PATCH - update DELETE - delete

178. Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec? SSL VPN dynamic multipoint VPN GRE over IPsec IPsec virtual tunnel interface

GRE over IPsec

61. Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN? -MD5 -AES -IPsec -ESP

IPsec

126. Which three types of VPNs are examples of enterprise-managed site-to-site VPNs? (Choose three.) -Layer 3 MPLS VPN -IPsec VPN -Cisco Dynamic Multipoint VPN -GRE over IPsec VPN -clientless SSL VPN -client-based IPsec VPN

IPsec VPN Cisco Dynamic Multipoint VPN GRE over IPsec VPN

67. Which statement accurately describes a characteristic of IPsec? -IPsec works at the application layer and protects all application data. -IPsec is a framework of standards developed by Cisco that relies on OSI algorithms. -IPsec is a framework of proprietary standards that depend on Cisco specific algorithms. -IPsec works at the transport layer and protects data at the network layer. -IPsec is a framework of open standards that relies on existing algorithms.

IPsec is a framework of open standards that relies on existing algorithms.

182. Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding? MPLS VPN IPsec virtual tunnel interface dynamic multipoint VPN GRE over IPsec

IPsec virtual tunne interface

69. Which two statements describe the use of asymmetric algorithms? (Choose two.) -Public and private keys may be used interchangeably. -If a public key is used to encrypt the data, a public key must be used to decrypt the data. -If a private key is used to encrypt the data, a public key must be used to decrypt the data. -If a public key is used to encrypt the data, a private key must be used to decrypt the data. -If a private key is used to encrypt the data, a private key must be used to decrypt the data.

If a private key is used to encrypt the data, a public key must be used to decrypt the data. If a public key is used to encrypt the data, a private key must be used to decrypt the data.

174. Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers but PC1 is unable to connect to PC2. What is the most likely problem? Interface Fa0/0 has not been activated for OSPFv2 on router R2. Interface Fa0/0 is configured as a passive-interface on router R2. Interface S0/0 is configured as a passive-interface on router R2. Interface s0/0 has not been activated for OSPFv2 on router R2.

Interface Fa0/0 has not been activated for OSPFv2 on router R2.

128. In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.) -It can be viewed by using the show ip ospf database command. -A neighbor table is created based on the LSDB. -It contains a list of only the best routes to a particular network. -It contains a list of all neighbor routers to which a router has established bidirectional communication. -All routers within an area have an identical link-state database.

It can be viewed by using the show ip ospf database command. All routers within an area have an identical link-state database.

78. What is the main function of a hypervisor? -It is used to create and manage multiple VM instances on a host machine. -It is a device that filters and checks security credentials. -It is a device that synchronizes a group of sensors. -It is software used to coordinate and prepare data for analysis. -It is used by ISPs to monitor cloud computing resources.

It is used to create and manage multiple VM instances on a host machine.

192. What protocol allows the manager to poll agents to access information from the agent MIB? CBWFQ SYSLOG TFTP SNMP

SNMP

65. Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem? -The NAT pool has been exhausted. -The wrong netmask was used on the NAT pool. -Access-list 1 has not been configured properly. -The inside and outside interfaces have been configured backwards.

The NAT pool has been exhausted.

125. Refer to the exhibit. An administrator is trying to back up the current running configuration of the router to a USB drive, and enters the command copy usbflash0:/R1-config running-config on the router command line. After removing the USB drive and connecting it to a PC, the administrator discovers that the running configuration was not properly backed up to the R1-config file. What is the problem? -The file already exists on the USB drive and cannot be overwritten. -The drive was not properly formatted with the FAT16 file system. -There is no space left on the USB drive. -The USB drive is not recognized by the router. -The command that the administrator used was incorrect.

The command that the administrator used was incorrect.

52. What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​ -The spine and leaf switches are always linked through core switches. -The spine switches attach to the leaf switches and attach to each other for redundancy. -The leaf switches always attach to the spines and they are interlinked through a trunk line. -The leaf switches always attach to the spines, but they never attach to each other.

The leaf switches always attach to the spines, but they never attach to each other.

164. Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.) The web server at 192.168.0.10 is reachable from the source host. DNS cannot resolve the IP address for the server web-s1.cisco.com. A router is down between the source host and the server web-s1.cisco.com. There is a problem with the web server software on web-s1.cisco.com. The default gateway between the source host and the server at 192.168.0.10 is down.

The web server at 192.168.0.10 is reachable from the source host. DNS cannot resolve the IP address for the server web-s1.cisco.com.

66. What are two benefits of using SNMP traps? (Choose two.) -They eliminate the need for some periodic polling requests. -They reduce the load on network and agent resources. -They limit access for management systems only. -They can provide statistics on TCP/IP packets that flow through Cisco devices. -They can passively listen for exported NetFlow datagrams

They eliminate the need for some periodic polling requests. They reduce the load on network and agent resources.

70. Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary? -Trust Boundary 4 -Trust Boundary 3 -Trust Boundary 1 -Trust Boundary 2

Trust Boundary 1

122. A company has consolidated a number of servers and it is looking for a program or firmware to create and control virtual machines which have access to all the hardware of the consolidated servers. What service or technology would support this requirement? -Cisco ACI -software defined networking -Type-1 hypervisor -APIC-EM

Type-1 hypervisor

205. What are two features to consider when creating a named ACL? (Choose two.) Use alphanumeric characters if needed. Use special characters, such as ! or * to show the importance of the ACL. Modify the ACL using a text editor. Be descriptive when creating the ACL name. Use a space for ease of reading to separate the name from the description

Use alphanumeric characters if needed. Be descriptive when creating the ACL name.

57. Which type of resources are required for a Type 1 hypervisor? -a dedicated VLAN -a management console -a host operating system

a management console

202. Which virtual resource would be installed on a network server to provide direct access to hardware resources? VMware Fusion a management console a dedicated VLAN a Type 1 hypervisor

a. Type 1 hypervisor

123. What command would be used as part of configuring NAT or PAT to identify inside local addresses that are to be translated? -ip nat inside source list 24 interface serial 0/1/0 overload -ip nat inside source list 14 pool POOL-STAT overload -access-list 10 permit 172.19.89.0 0.0.0.255 -ip nat inside source list ACCTNG pool POOL-STAT

access-list 10 permit 172.19.89.0 0.0.0.255

129. In an OSPF network which OSPF structure is used to create the neighbor table on a router? -adjacency database -link-state database -routing table -forwarding database

adjacency database

196. Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.) cost of the link amount of traffic distance between sites reliability security needs type of traffic

amount of traffic security needs type of trafic

55. What are two types of attacks used on DNS open resolvers? (Choose two.) -amplification and reflection -resource utilization -fast flux -ARP poisoning -cushioning

amplification and reflection resource utilization

58. In JSON, what is held within square brackets [ ]? -nested values -key/value pairs -an object -an array

an array

212. A network technician is configuring SNMPv3 and has set a security level of SNMPv3 authPriv. What is a feature of using this level? authenticates a packet by using the SHA algorithm only authenticates a packet by a string match of the username or community string authenticates a packet by using either the HMAC with MD5 method or the SHA method authenticates a packet by using either the HMAC MD5 or HMAC SHA algorithms and a username

authenticates a packet by using either the HMAC with MD5 method or the SHA method

54. A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting? -authenticates a packet by a string match of the username or community string -authenticates a packet by using either the HMAC with MD5 method or the SHA method -authenticates a packet by using either the HMAC MD5 or 3.HMAC SHA -algorithms and encrypts the packet with either the DES, 3DES or AES algorithms -authenticates a packet by using the SHA algorithm only

authenticates a packet by using either the HMAC with MD5 method or the SHA method

73. A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers? -botnet -spyware -virus -rootkit

botnet

208. Which step in the link-state routing process is described by a router inserting best paths into the routing table? declaring a neighbor to be inaccessible executing the SPF algorithm load balancing equal-cost paths choosing the best route

choosing the best route

77. What QoS step must occur before packets can be marked? -classifying -shaping -queuing -policing

classifying

209. Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting. What service or technology would support this requirement? data center virtualization cloud services dedicated servers

cloud services

68. In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.) -connect users to the network -provide a high-speed network backbone -connect remote networks -provide Power over Ethernet to devices -provide data traffic security

connect remote networks provide data traffic security

53. Which two scenarios would result in a duplex mismatch? (Choose two.) -connecting a device with autonegotiation to another that is manually set to full-duplex -starting and stopping a router interface during a normal operation -connecting a device with an interface running at 100 Mbps to another with an interface running at 1000 Mbps -configuring dynamic routing incorrectly -manually setting the two connected devices to different duplex modes

connecting a device with autonegotiation to another that is manually set to full-duplex manually setting the two connected devices to different duplex modes

187. What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation? data link access core network network access

core

184. What type of traffic is described as using either TCP or UDP depending on the need for error recovery? video voice data

data

189. What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical? video data voice

data

What type of traffic is described as consisting of traffic that requires a higher priority if interactive? voice data video

data

199. An ACL is applied inbound on a router interface. The ACL consists of a single entry:access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp . If a packet with a source address of 172.18.20.55, a destination address of 172.18.20.3, and a protocol of 21 is received on the interface, is the packet permitted or denied?

denied

74. An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq DNS . If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?

denied

56. An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet . If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied? Case 2: access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.0.15 eq telnet . If a packet with a source address of 192.168.100.219, a destination address of 64.100.40.10, and a protocol of 54 is received on the interface, is the packet permitted or denied?

denied Case 2: denied

60. A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician? -top-down -bottom-up -divide-and-conquer -substitution

divide-and-conquer

168. Which type of VPN provides a flexible option to connect a central site with branch sites? IPsec virtual tunnel interface MPLS VPN dynamic multipoint VPN GRE over IPsec

dynamic multipoint VPN

172. Which step in the link-state routing process is described by a router sending Hello packets out all of the OSPF-enabled interfaces? exchanging link-state advertisements electing the designated router injecting the default route establishing neighbor adjacencies

establishing neighbor adjacencies

183. Which step in the link-state routing process is described by a router flooding link-state and cost information about each directly connected link? building the topology table selecting the router ID exchanging link-state advertisements injecting the default route

exchanging link-state advertisements

211. Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation? extended ACL inbound on R1 G0/0 extended ACL outbound on R2 WAN interface towards the internet extended ACL outbound on R2 S0/0/1 extended ACLs inbound on R1 G0/0 and G0/1

extended ACL inbound on R1 G0/0

200. Refer to the exhibit. Corporate policy demands that access to the server network be restricted to internal employees only. What is the best ACL type and placement to use in this situation? Corporate policy demands that access to the server network be restricted to internal employees only. What is the best ACL type and placement to use in this situation extended ACL outbound on R2 S0/0/1 standard ACL outbound on R2 S0/0/0 standard ACL inbound on R2 WAN interface connecting to the internet extended ACL inbound on R2 S0/0/0

extended ACL outbound on R2 S0/0/1

185. Refer to the exhibit. The company CEO demands that one ACL be created to permit email traffic to the internet and deny FTP access. What is the best ACL type and placement to use in this situation? extended ACL outbound on R2 WAN interface towards the internet standard ACL outbound on R2 S0/0/0 extended ACL inbound on R2 S0/0/0 standard ACL inbound on R2 WAN interface connecting to the internet

extended ACL outbound on R2 WAN interface towards the internet

75. Refer to the exhibit. From which location did this router load the IOS? -flash memory -NVRAM? -RAM -ROM -a TFTP server?

flash memory

59. What are three components used in the query portion of a typical RESTful API request? (Choose three.) -resources -protocol -API server -format -key -parameters

format key parameters

64. Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.) -device type -cable specification -interface identifier -OS/IOS version -connection type -cable type and identifier

interface identifier connection type

197. What command would be used as part of configuring NAT or PAT to link the inside local addresses to the pool of addresses available for PAT translation? ip nat inside source list ACCTNG pool POOL-STAT ip nat translation timeout 36000 ip nat inside source list 14 pool POOL-STAT overload ip nat inside source static 172.19.89.13 198.133.219.65

ip nat inside source list 14 pool POOL-STAT overload

180. What command would be used as part of configuring NAT or PAT to identify an interface as part of the external global network? ip pat inside access-list 10 permit 172.19.89.0 0.0.0.255 ip nat inside ip nat outside

ip nat outside

186. What command would be used as part of configuring NAT or PAT to define a pool of addresses for translation? ip nat inside source static 172.19.89.13 198.133.219.65 ip nat inside source list 24 interface serial 0/1/0 overload ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240 ip nat outside

ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240

204. Which OSPF database is identical on all converged routers within the same OSPF area? neighbor forwarding link-state adjacency

link-state

121. Which group of APIs are used by an SDN controller to communicate with various applications? -eastbound APIs -westbound APIs -northbound APIs -southbound APIs

northbound APIs

45. A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed? -data integrity -non-repudiation -origin authentication -data confidentiality

origin authentication

188. An ACL is applied inbound on router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.47 any eq ftp If a packet with a source address of 172.18.20.40, a destination address of 10.33.19.2, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted

191. An ACL is applied inbound on a router interface. The ACL consists of a single entry:access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq www . If a packet with a source address of 192.168.10.45, a destination address of 10.10.3.27, and a protocol of 80 is received on the interface, is the packet permitted or denied?

permitted

51. An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq FTP . If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted

71. What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.) -reduced costs -decreased number of critical points of failure -increased flexibility -increased bandwidth availability -increased network management options

reduced costs increased flexibility

210. Which QoS technique smooths packet output rate? policing shaping weighted random early detection Integrated Services (IntServ) marking

shaping

201. A technician is working on a Layer 2 switch and notices that a %CDP-4-DUPLEX_MISMATCH message keeps appearing for port G0/5. What command should the technician issue on the switch to start the troubleshooting process? show cdp neighbors show ip interface brief show interface g0/5 show cdp

show interface g0/5

176. A network engineer has noted that some expected network route entries are not displayed in the routing table. Which two commands will provide additional information about the state of router adjacencies, timer intervals, and the area ID? (Choose two.) show ip protocols show ip ospf neighbor show running-configuration show ip ospf interface show ip route ospf

show ip ospf neighbor show ip ospf interface

127. Refer to the exhibit. Employees on 192.168.11.0/24 work on critically sensitive information and are not allowed access off their network. What is the best ACL type and placement to use in this situation? -standard ACL inbound on R1 vty lines -extended ACL inbound on R1 G0/0 -standard ACL inbound on R1 G0/1 -extended ACL inbound on R3 S0/0/1

standard ACL inbound on R1 G0/1

63. Which component of the ACI architecture translates application policies into network programming? -the hypervisor​ -the Application Policy Infrastructure Controller -the Nexus 9000 switch -the Application Network Profile endpoints

the Application Policy Infrastructure Controller

171. Two OSPF-enabled routers are connected over a point-to-point link. During the ExStart state, which router will be chosen as the first one to send DBD packets? the router with the highest router ID the router with the lowest IP address on the connecting interface the router with the highest IP address on the connecting interface the router with the lowest router ID

the router with the highest router ID

46. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers? -to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network -to detect any evidence of a hack or malware in a computer or network -to probe and test the robustness of a firewall by using specially created forged packets -to capture and analyze packets within traditional Ethernet LANs or WLANs

to capture and analyze packets within traditional Ethernet LANs or WLANs

173. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools? to obtain specially designed operating systems preloaded with tools optimized for hacking to detect any evidence of a hack or malware in a computer or network to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network to reverse engineer binary files when writing exploits and when analyzing malware

to detect any evidence of a hack or malware in a computer or network

169. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use fuzzers? to discover security vulnerabilities of a computer to detect any evidence of a hack or malware in a computer or network to reverse engineer binary files when writing exploits and when analyzing malware to detect installed tools within files and directories that provide threat actors remote access and control over a computer or network

to discover security vulnerabilities of a computer

50. What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use? -to activate the OSPF neighboring process -to influence the DR/BDR election process -to provide a backdoor for connectivity during the convergence process -to streamline and speed up the convergence process

to influence the DR/BDR election process

41. A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa? -to capture and analyze packets within traditional Ethernet LANs or WLANs -to probe and test the robustness of a firewall by using specially created forged packets -to make repeated guesses in order to crack a password

to make repeated guesses in order to crack a password

76. Refer to the exhibit. Which data format is used to represent the data for network automation applications? -XML -YAML -HTML -JSON

JSON

198. What protocol is a vendor-neutral Layer 2 discovery protocol that must be configured separately to transmit and receive information packets? SNMP MPLS LLDP NTP

LLDP

177. Which type of VPN involves the forwarding of traffic over the backbone through the use of labels distributed among core routers? MPLS VPN GRE over IPsec IPsec virtual tunnel interface dynamic multipoint VPN

MPLS VPN

43. What is a characteristic of a Trojan horse as it relates to network security? -An electronic dictionary is used to obtain a password to be used to infiltrate a key network device. -Malware is contained in a seemingly legitimate executable program. -Extreme quantities of data are sent to a particular network device interface. -Too much information is destined for a particular memory block, causing additional memory areas to be affecte

Malware is contained in a seemingly legitimate executable program.

62. Which statement describes a characteristic of Cisco Catalyst 2960 switches? -They are best used as distribution layer switches. -New Cisco Catalyst 2960-C switches support PoE pass-through. -They are modular switches. -They do not support an active switched virtual interface (SVI) with IOS versions prior to 15.x.

New Cisco Catalyst 2960-C switches support PoE pass-through.

48. Match the HTTP method with the RESTful operation.

POST ->> Create GET ->> Read PUT/PATCH ->> Update/Replace?Modify Delete ->> Delete

170. Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface, but not the G0/0 interface. When following the best practices, in what location should the standard ACL be applied? R1 S0/0/0 outbound R2 G0/0 outbound R2 S0/0/1 outbound R1 S0/0/0 inbound R2 G0/1 inbound

R2 G0/0 outbound

203. Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface. When following the best practices, in what location should the standard ACL be applied? Enterprise Networking, Security, and Automation ( Version 7.00) - ENSA Final Exam R2 G0/1 inbound R2 S0/0/1 outbound R1 S0/0/0 outbound R2 G0/1 outbound R2 G0/0 outbound

R2 g0/1 outbound


Kaugnay na mga set ng pag-aaral

Combo with "Biology Final Review" and 10 others

View Set

Physics Electricial Circuits Review

View Set

Physical Therapists Assistant and What They Do

View Set

Chapter 52: Assessment of the Gastrointestinal System

View Set

Optional: Familiar with data analytics? Take our diagnostic quiz

View Set

info 360:Homework: Chapter 3 Video: Organizational Strategy, Information

View Set