Practice Exam Questions
A user is reading a book from the website https://www.books-info.com/author1a/book2.html#page100 . Which part of the web link is called a fragment?
#page100
What is the significant characteristic of worm malware?
A worm can execute independently of the host system.
First OSPF state
Down
Fifth OSPF state
Exchange
Which statement describes a feature of site-to-site VPNs?
Internal hosts send normal, unencapsulated packets.
What is the best description of Trojan horse malware?
It appears as useful software but hides malicious code.
Sixth OSPF state
Loading
What is the function of ASICs in a multilayer switch?
They streamline forwarding of IP packets in a multilayer switch by bypassing the CPU.
Third OSPF state
Two-way
Which two methods help to prevent the disruption of network services? (Choose two.)
installing duplicate equipment to provide failover services using redundant connections to provide alternate physical paths
Which type of NAT maps a single inside local address to a single inside global address?
static
What is the port density of a switch?
the number of available ports on a switch
Which number represents the most severe level of syslog logging?
0
If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?
8
Second OSPF state
Init
What is a feature of an IPS?
It can stop malicious packets.
A network technician has used the access-llst 1 permit 172.16.0.0 0.0.0.255 command to configure NAT on an edge router to translate only four networks, 172.16.0.0 /24, 172.16.1.0 /24, 172.16.2.0 /24, and 172.16.3.0 /24. After receiving complaints about limited access to the Internet, issuing the show ip nat translations command reveals that some networks are missing from the output. Which change will resolve the problem?
The access list should be replaced with access-list 1 permit 172.16.0.0 0.0.3.255
Which SNMP message type informs the network management system (NMS) immediately of certain specified events?
Trap
Which two types of devices are specific to WAN environments and are not found on a LAN? (Choose two.)
broadband modem CSU/DSU
Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?
building the topology table
Which VPN solution allows the use of a web browser to establish a secure, remote-access VPN tunnel to the ASA?
clientless SSL
Which two types of VPNs are examples of enterprise-managed remote access VPNs? (Choose two.)
clientless SSL VPN client-based IPsec VPN
Which command will backup the configuration that is stored in NVRAM to a TFTP server?
copy startup-config tftp
Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?
database description
Which technology provides laptops the ability to function on a cellular network?
mobile hotspot
Which type of tool would an administrator use to capture packets that are going to and from a particular device?
protocol analyzer
What is a characteristic of the distribution layer in the three layer hierarchical model?
provides access to the rest of the network through switching, routing, and network access policies
Which QoS technique retains excess packets in a separate queue for later transmission?
shaping
Why would a network administrator use the config-register 0x2102 command on a Cisco network device?
to ensure that the device loads the startup configuration file during startup
A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?
to secure administrative access to the router
Fourth OSPF state
Exstart
Seventh OSPF state
Full
What defines a two-tier spine-leaf topology?
The Cisco APICs and all other devices in the network physically attach to leaf switches.
A user reports that the workstation cannot connect to a networked printer in the office in order to print a report created with word processing software. Which troubleshooting action by the helpdesk technician would follow the divide-and-conquer approach?
Ask the user to issue the ipconfig command.
Which two statements describe remote access VPNs? (Choose two.)
Client software is usually required to be able to access the network. Remote access VPNs support the needs of telecommuters and mobile users.
What is a difference between the functions of Cloud computing and virtualization?
Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.
Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)
Filter unwanted traffic before it travels onto a low-bandwidth link. Place extended ACLs close to the source IP address of the traffic. Place standard ACLs close to the destination IP address of the traffic.
What is correct in relation to NAT for IPv6?
It is a temporary mechanism to assist in the migration from IPv4 to IPv6.
Which QoS mechanism allows delay-sensitive data, such as voice, to be sent first before packets in other queues are sent?
LLQ
Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)
Layer 2 Layer 3
An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?
R1(config-line)# access-class 1 in
A network administrator is troubleshooting the dynamic NAT that is configured on router R2. Which command can the administrator use to see the total number of active NAT translations and the number of addresses that are allocated from the NAT pool?
R2# show ip nat statistics
When JSON data format is being used, what characters are used to hold objects?
double braces { }
When an OSPF network is converged and no network topology change has been detected by a router, How often will LSU packets be sent to neighboring routers?
every 30 mins
Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?
show ip ospf interface serial 0/0/0
What are the two purposes of an OSPF router ID? (Choose two.)
to uniquely identify the router within the OSPF domain to facilitate router participation in the election of the designated router
What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?
traffic marking
Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?
type 2
Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)
type of traffic amount of traffic security needs
Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?
virus