ccna 3 final exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?

0.0.3.255

Refer to the exhibit. If no router ID was manually configured, what would router Branch1 use as its OSPF router ID?

192.168.1.100

Refer to the exhibit. If no router ID was manually configured, what would router R1 use as its OSPF router ID?

192.168.1.100

Refer to the exhibit. Which address or addresses represent the inside global address?

209.165.20.25

Refer to the exhibit. A network administrator needs to add an ACE to the TRAFFIC-CONTROL ACL that will deny IP traffic from the subnet 172.23.16.0/20. Which ACE will meet this requirement?

5 deny 172.23.16.0 0.0.15.255

Refer to the exhibit. What is the OSPF cost to reach the West LAN 172.16.2.0/24 from East?​

65

Refer to the exhibit. What is the OSPF cost to reach the router A LAN 172.16.1.0/24 from B?

65

If a router has two interfaces and is routing both IPv4 and IPv6 traffic, how many ACLs could be created and applied to it?

8

A network administrator modified an OSPF-enabled router to have a hello timer setting of 20 seconds. What is the new dead interval time setting by default?

80 seconds

Which two statements are characteristics of a virus? (Choose two.)

A virus can be dormant and then activate at a specific time or date. A virus typically requires end-user activation.

What is the significant characteristic of worm malware?

A worm can execute independently of the host system.

Refer to the exhibit. A network administrator is configuring a standard IPv4 ACL. What is the effect after the command no access-list 10 is entered?

ACL 10 is removed from the running configuration

What is a characteristic of a single-area OSPF network?

All routers are in the backbone area.

What protocol sends periodic advertisements between connected Cisco devices in order to learn device name, IOS version, and the number and type of interfaces?

CDP

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers as shown. The routers are unable to form a neighbor adjacency. What should be done to fix the problem?

Change the IP address on S0/0 of router R2 to 192.168.20.2

Which type of VPN provides a flexible option to connect a central site with branch sites?

Cisco Dynamic Multipoint VPN

What technology allows users to access data anywhere and at any time?

Cloud computing

What is a difference between the functions of Cloud computing and virtualization?

Cloud computing separates the application from the hardware whereas virtualization separates the OS from the underlying hardware.

Which type of QoS marking is applied to Ethernet frames?

CoS

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers. The routers are unable to form a neighbor adjacency. What should be done to fix the problem on router R2?

Implement the command no passive-interface Serial0/1.

Which queuing mechanism has no provision for prioritizing or buffering but simply forwards packets in the order they arrive?

FIFO

Which three statements are generally considered to be best practices in the placement of ACLs? (Choose three.)

Filter unwanted traffic before it travels onto a low-bandwidth link. Place standard ACLs close to the destination IP address of the traffic. Place extended ACLs close to the source IP address of the traffic.

Which type of VPN involves a nonsecure tunneling protocol being encapsulated by IPsec?

GRE over IPsec

Which device would be classified as a trusted endpoint?

IP phone

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN?

IPsec

Which three types of VPNs are examples of enterprise-managed site-to-site VPNs? (Choose three.)

IPsec VPN Cisco Dynamic Multipoint VPN GRE over IPsec VPN

Which statement accurately describes a characteristic of IPsec?

IPsec is a framework of open standards that relies on existing algorithms.

Which type of VPN routes packets through virtual tunnel interfaces for encryption and forwarding?

IPsec virtual tunnel interface

Which two statements describe the use of asymmetric algorithms? (Choose two.)

If a private key is used to encrypt the data, a public key must be used to decrypt the data. If a public key is used to encrypt the data, a private key must be used to decrypt the data.

Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers but PC1 is unable to connect to PC2. What is the most likely problem?

Interface Fa0/0 has not been activated for OSPFv2 on router R2

Refer to the exhibit. A technician is configuring R2 for static NAT to allow the client to access the web server. What is a possible reason that the client PC cannot access the web server?

Interface S0/0/0 should be identified as the outside NAT interface.

Which term is used to describe a set of instructions for execution by the configuration management tool Puppet?

Manifest

If an outside host does not have the Cisco AnyConnect client preinstalled, how would the host gain access to the client image?

The host initiates a clientless VPN connection using a compliant web browser to download the client.

Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?

Trust Boundary 1

Refer to the exhibit. The company has decided that no traffic initiating from any other existing or future network can be transmitted to the Research and Development network. Furthermore, no traffic that originates from the Research and Development network can be transmitted to any other existing or future networks in the company. The network administrator has decided that extended ACLs are better suited for these requirements. Based on the information given, what will the network administrator do?

Two ACLs (one in each direction) will be placed on the R2 Gi0/0 interface.

Consider the following output for an ACL that has been applied to a router via the access-class in command. What can a network administrator determine from the output that is shown? R1# Standard IP access list 2 10 permit 192.168.10.0, wildcard bits 0.0.0.255 (2 matches) 20 deny any (1 match)

Two devices were able to use SSH or Telnet to gain access to the router.

In which OSPF state is the DR/BDR election conducted?

Two-Way

Which type of hypervisor would most likely be used in a data center?

Type 1

A company has consolidated a number of servers and it is looking for a program or firmware to create and control virtual machines which have access to all the hardware of the consolidated servers. What service or technology would support this requirement?

Type-1 hypervisor

What are two features to consider when creating a named ACL? (Choose two.)

Use alphanumeric characters if needed Be descriptive when creating the ACL name.

Refer to the exhibit. What method can be used to enable an OSPF router to advertise a default route to neighboring OSPF routers?

Use the default-information originate command on R0-A.

Which statement describes a VPN?

VPNs use virtual connections to create a private network through a public network.

What are two characteristics of video traffic? (Choose two.)

Video traffic latency should not exceed 400 ms. Video traffic is unpredictable and inconsistent.

Why is QoS an important issue in a converged network that combines voice, video, and data communications?

Voice and video communications are more sensitive to latency.

What is REST?

What is REST?

What is a difference between the XML and HTML data formats?

What is a difference between the XML and HTML data formats?

Refer to the exhibit. Which conclusion can be drawn from this OSPF multiaccess network?

With an election of the DR, the number of adjacencies is reduced from 6 to 3.*

Which virtual resource would be installed on a network server to provide direct access to hardware resources?

a Type 1 hypervisor

Which troubleshooting approach is more appropriate for a seasoned network administrator rather than a less-experienced network administrator?

a less-structured approach based on an educated guess

Which type of resources are required for a Type 1 hypervisor?

a management console

What is a WAN?

a network infrastructure that provides access to other networks over a large geographic area

Which cloud model provides services for a specific organization or entity?

a private cloud

In which situation would a partner API be appropriate?

a vacation service site interacting with hotel databases to display information from all the hotels on its web site

What command would be used as part of configuring NAT or PAT to identify inside local addresses that are to be translated?

access-list 10 permit 172.19.89.0 0.0.0.255

Which set of access control entries would allow all users on the 192.168.10.0/24 network to access a web server that is located at 172.17.80.1, but would not allow them to use Telnet?

access-list 103 permit tcp 192.168.10.0 0.0.0.255 host 172.17.80.1 eq 80 access-list 103 deny tcp ​192.168.10.0 0.0.0.255 any eq 23

Refer to the exhibit. What is the purpose of the command marked with an arrow shown in the partial configuration output of a Cisco broadband router?

defines which addresses can be translated

When QoS is implemented in a converged network, which two factors can be controlled to improve network performance for real-time traffic? (Choose two.)

delay jitter

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp . If a packet with a source address of 172.18.20.55, a destination address of 172.18.20.3, and a protocol of 21 is received on the interface, is the packet permitted or denied?

denied

A user reports that when the corporate web page URL is entered on a web browser, an error message indicates that the page cannot be displayed. The help-desk technician asks the user to enter the IP address of the web server to see if the page can be displayed. Which troubleshooting method is being used by the technician?

divide-and-conquer

Which is a characteristic of a Type 2 hypervisor?​

does not require management console software

Which type of VPN allows multicast and broadcast traffic over a secure site-to-site VPN?

dynamic multipoint VPN

Which type of VPN uses a hub-and-spoke configuration to establish a full mesh topology?

dynamic multipoint VPN

Which step in the link-state routing process is described by a router sending Hello packets out all of the OSPF-enabled interfaces?

establishing neighbor adjacencies

When an OSPF network is converged and no network topology change has been detected by a router, how often will LSU packets be sent to neighboring routers?

every 30 minutes

Which step in the link-state routing process is described by a router flooding link-state and cost information about each directly connected link?

exchanging link-state advertisements

Which step in the link-state routing process is described by a router running an algorithm to determine the best path to each destination?

executing the SPF algorithm

Refer to the exhibit. The company has provided IP phones to employees on the 192.168.10.0/24 network and the voice traffic will need priority over data traffic. What is the best ACL type and placement to use in this situation?

extended ACL inbound on R1 G0/0

Refer to the exhibit. Corporate policy demands that access to the server network be restricted to internal employees only. What is the best ACL type and placement to use in this situation?

extended ACL outbound on R2 S0/0/1

Refer to the exhibit. The company CEO demands that one ACL be created to permit email traffic to the internet and deny FTP access. What is the best ACL type and placement to use in this situation?

extended ACL outbound on R2 WAN interface towards the internet

Refer to the exhibit. Many employees are wasting company time accessing social media on their work computers. The company wants to stop this access. What is the best ACL type and placement to use in this situation?

extended ACLs inbound on R1 G0/0 and G0/1

Refer to the exhibit. From which location did this router load the IOS?

flash memory

What are three components used in the query portion of a typical RESTful API request? (Choose three.)

format key parameters

What is a function of the data plane of a network device?

forwarding traffic flows

What is the final operational state that will form between an OSPF DR and a DROTHER once the routers reach convergence?

full

Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?

hello

What are three advantages of using private IP addresses and NAT? (Choose three.)

hides private LAN addressing from outside devices that are connected to the Internet permits LAN expansion without additional public IP addresses conserves registered public IP addresses

What command would be used as part of configuring NAT or PAT to link the inside local addresses to the pool of addresses available for PAT translation?

ip nat inside source list 14 pool POOL-STAT overload

What command would be used as part of configuring NAT or PAT to identify an interface as part of the external global network?

ip nat outside

What command would be used as part of configuring NAT or PAT to define a pool of addresses for translation?

ip nat pool POOL-STAT 64.100.14.17 64.100.14.30 netmask 255.255.255.240

What is the term used to indicate a variation of delay?

jitter

A network engineer performs a ping test and receives a value that shows the time it takes for a packet to travel from a source to a destination device and return. Which term describes the value?

latency

A company is considering updating the campus WAN connection. Which two WAN options are examples of the private WAN architecture? (Choose two.)

leased line Ethernet WAN

Which OSPF database is identical on all converged routers within the same OSPF area?

link-state

Which type of OSPFv2 packet is used to forward OSPF link change information?

link-state update

What is a characteristic of the REST API?

most widely used API for web services

Refer to the exhibit. An administrator configures the following ACL in order to prevent devices on the 192.168.1.0 subnet from accessing the server at 10.1.1.5: access-list 100 deny ip 192.168.1.0 0.0.0.255 host 10.1.1.5 access-list 100 permit ip any any Where should the administrator place this ACL for the most efficient use of network resources?

nbound on router A Fa0/0

Which group of APIs are used by an SDN controller to communicate with various applications?

northbound APIs

A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?

origin authentication

Refer to the exhibit. If the network administrator created a standard ACL that allows only devices that connect to the R2 G0/0 network access to the devices on the R1 G0/1 interface, how should the ACL be applied?

outbound on the R1 G0/1 interface

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 100 permit tcp 192.168.10.0 0.0.0.255 172.17.200.0 0.0.0.255 eq www . If a packet with a source address of 192.168.10.244, a destination address of 172.17.200.56, and a protocol of 80 is received on the interface, is the packet permitted or denied?

permitted

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit udp 192.168.100.0 0.0.2.255 64.100.40.0 0.0.0.15 eq telnet . If a packet with a source address of 192.168.101.45, a destination address of 64.100.40.4, and a protocol of 23 is received on the interface, is the packet permitted or denied?

permitted

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted

An ACL is applied inbound on a router interface. The ACL consists of a single entry:access-list 100 permit tcp 192.168.10.0 0.0.0.255 any eq www . If a packet with a source address of 192.168.10.45, a destination address of 10.10.3.27, and a protocol of 80 is received on the interface, is the packet permitted or denied?

permitted

An ACL is applied inbound on router interface. The ACL consists of a single entry: access-list 210 permit tcp 172.18.20.0 0.0.0.47 any eq ftp If a packet with a source address of 172.18.20.40, a destination address of 10.33.19.2, and a protocol of 21 is received on the interface, is the packet permitted or denied?

permitted

Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices?

private

What two benefits are gained when an organization adopts cloud computing and virtualization? (Choose two.)

provides a "pay-as-you-go" model, allowing organizations to treat computing and storage expenses as a utility enables rapid responses to increasing data volume requirements

Which RESTFul operation corresponds to the HTTP GET method?

read

What are two benefits of extending access layer connectivity to users through a wireless medium? (Choose two.)

reduced costs increased flexibility

Refer to the exhibit. Which sequence of commands should be used to configure router A for OSPF?

router ospf 1 network 192.168.10.64 0.0.0.63 area 0 network 192.168.10.192 0.0.0.3 area 0

An OSPF router has three directly connected networks; 10.0.0.0/16, 10.1.0.0/16, and 10.2.0.0/16. Which OSPF network command would advertise only the 10.1.0.0 network to neighbors?

router(config-router)# network 10.1.0.0 0.0.255.255 area 0

Which statement describes the concept of cloud computing?

separation of application from hardware

A technician is working on a Layer 2 switch and notices that a %CDP-4-DUPLEX_MISMATCH message keeps appearing for port G0/5. What command should the technician issue on the switch to start the troubleshooting process?

show interface g0/5

What command would be used as part of configuring NAT or PAT to display information about NAT configuration parameters and the number of addresses in the pool?

show ip nat statistics

What command would be used as part of configuring NAT or PAT to display all static translations that have been configured?

show ip nat translations

What command would be used as part of configuring NAT or PAT to display any dynamic PAT translations that have been created by traffic?

show ip nat translations

Which command will a network engineer issue to verify the configured hello and dead timer intervals on a point-to-point WAN link between two routers that are running OSPFv2?

show ip ospf interface serial 0/0/0

A network engineer has noted that some expected network route entries are not displayed in the routing table. Which two commands will provide additional information about the state of router adjacencies, timer intervals, and the area ID? (Choose two.)

show ip ospf neighbor show ip ospf interface

What are the two types of VPN connections? (Choose two.)

site-to-site remote access

Two corporations have just completed a merger. The network engineer has been asked to connect the two corporate networks without the expense of leased lines. Which solution would be the most cost effective method of providing a proper and secure connection between the two corporate networks?

site-to-site VPN

A company uses a cloud-based payroll system. Which cloud computing technology is this company using?

software as a service (SaaS)

Refer to the exhibit. Employees on 192.168.11.0/24 work on critically sensitive information and are not allowed access off their network. What is the best ACL type and placement to use in this situation?

standard ACL inbound on R1 G0/1

Refer to the exhibit. The network administrator has an IP address of 192.168.11.10 and needs access to manage R1. What is the best ACL type and placement to use in this situation?

standard ACL inbound on R1 vty lines

Refer to the exhibit. Internet privileges for an employee have been revoked because of abuse but the employee still needs access to company resources. What is the best ACL type and placement to use in this situation?

standard ACL outbound on R2 WAN interface towards the internet

How does virtualization help with disaster recovery within a data center?

support of live migration

Which type of server would be used to keep a historical record of messages from monitored network devices?

syslog

What is YAML?

t is a data format and superset of JSON.

What is used to pre-populate the adjacency table on Cisco devices that use CEF to process packets?

the ARP table

What component is considered the brains of the ACI architecture and translates application policies​?

the Application Policy Infrastructure Controller

Which component of the ACI architecture translates application policies into network programming?

the Application Policy Infrastructure Controller

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

the configuration register value the startup configuration file

Two OSPF-enabled routers are connected over a point-to-point link. During the ExStart state, which router will be chosen as the first one to send DBD packets?

the router with the highest router ID

What pre-populates the FIB on Cisco devices that use CEF to process packets?

the routing table

Which design feature will limit the size of a failure domain in an enterprise network?

the use of the building switch block approach

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use packet sniffers?

to capture and analyze packets within traditional Ethernet LANs or WLANs

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools?

to detect any evidence of a hack or malware in a computer or network

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use fuzzers?

to discover security vulnerabilities of a computer

What is one reason to use the ip ospf priority command when the OSPF routing protocol is in use?

to influence the DR/BDR election process

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as John the Ripper,THC Hydra, RainbowCrack, and Medusa?

to make repeated guesses in order to crack a password

What are two functions of hypervisors? (Choose two.)

to manage virtual machines to allocate physical system resources to virtual machines

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use hacking operation systems?

to obtain specially designed operating systems preloaded with tools optimized for hacking

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as Nmap, SuperScan, and Angry IP Scanner?

to probe network devices, servers, and hosts for open TCP or UDP ports

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use debuggers?

to reverse engineer binary files when writing exploits and when analyzing malware

What are two purposes of launching a reconnaissance attack on a network? (Choose two.)

to scan for accessibility to gather information about the network and devices

A technician is tasked with using ACLs to secure a router. When would the technician use the access-class 20 in configuration option or command?

to secure administrative access to the router

What are the two purposes of an OSPF router ID? (Choose two.)

to uniquely identify the router within the OSPF domain to facilitate router participation in the election of the designated router

Which OSPF table is identical on all converged routers within the same OSPF area?

topology

What term describes adding a value to the packet header, as close to the source as possible, so that the packet matches a defined policy?

traffic marking

Refer to the exhibit. As traffic is forwarded out an egress interface with QoS treatment, which congestion avoidance technique is used?

traffic policing

Which type of Hypervisor is implemented when a user with a laptop running the Mac OS installs a Windows virtual OS instance?

type 2

Which action takes place in the assurance element of the IBN model?

verification and corrective action

What type of traffic is described as having a high volume of data per packet?

video

What type of traffic is described as requiring at least 384 Kbps of bandwidth?

video

What type of traffic is described as requiring latency to be no more than 400 milliseconds (ms)?

video

What type of traffic is described as tending to be unpredictable, inconsistent, and bursty?

video

A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?

virtualization

ABCTech is investigating the use of automation for some of its products. In order to control and test these products, the programmers require Windows, Linux, and MAC OS on their computers. What service or technology would support this requirement?

virtualization

To avoid purchasing new hardware, a company wants to take advantage of idle system resources and consolidate the number of servers while allowing for multiple operating systems on a single hardware platform. What service or technology would support this requirement?

virtualization

Which type of security threat can be described as software that attaches itself to another program to execute a specific unwanted function?

virus

What type of traffic is described as being able to tolerate a certain amount of latency, jitter, and loss without any noticeable effects?

voice

What type of traffic is described as predictable and smooth?

voice

When will an OSPF-enabled router transition from the Down state to the Init state?

when the router receives a hello packet from a neighbor router

Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting, what service or technology would support requirement?

-Cloud services

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 10.27.27.0 255.255.255.0. What wildcard mask would the administrator use in the OSPF network statement?

0.0.0.255

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.16.91.0 255.255.255.192. What wildcard mask would the administrator use in the OSPF network statement?

0.0.0.63

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 192.168.0.0 255.255.254.0. What wildcard mask would the administrator use in the OSPF network statement?

0.0.1.255

An administrator is configuring single-area OSPF on a router. One of the networks that must be advertised is 172.20.0.0 255.255.252.0. What wildcard mask would the administrator use in the OSPF network statement?

0.0.3.255

Which two scenarios are examples of remote access VPNs? (Choose two.)

A mobile sales agent is connecting to the company network via the Internet connection at a hotel. An employee who is working from home uses VPN client software on a laptop in order to connect to the company network.

What is a characteristic of a Trojan horse as it relates to network security?

Malware is contained in a seemingly legitimate executable program.

An attacker is redirecting traffic to a false default gateway in an attempt to intercept the data traffic of a switched network. What type of attack could achieve this?

DHCP spoofing

Which public WAN access technology utilizes copper telephone lines to provide access to subscribers that are multiplexed into a single T3 link connection?

DSL

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 10.1.3.8 eq dns . If a packet with a source address of 10.1.3.8, a destination address of 10.10.3.8, and a protocol of 53 is received on the interface, is the packet permitted or denied?

Denied

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit tcp 10.1.1.0 0.0.0.255 host 192.31.7.45 eq dns . If a packet with a source address of 10.1.1.201, a destination address of 192.31.7.45, and a protocol of 23 is received on the interface, is the packet permitted or denied?

Denied

An ACL is applied inbound on a router interface. The ACL consists of a single entry: access-list 101 permit udp 192.168.100.32 0.0.0.7 host 198.133.219.76 eq telnet If a packet with a source address of 198.133.219.100, a destination address of 198.133.219.170, and a protocol of 23 is received on the interface, is the packet permitted or denied?

Denied

What are two syntax rules for writing a JSON array? (Choose two.)

Each value in the array is separated by a comma. Values are enclosed in square brackets.

A company needs to interconnect several branch offices across a metropolitan area. The network engineer is seeking a solution that provides high-speed converged traffic, including voice, video, and data on the same network infrastructure. The company also wants easy integration to their existing LAN infrastructure in their office locations. Which technology should be recommended?

Ethernet WAN

A customer needs a metropolitan area WAN connection that provides high-speed, dedicated bandwidth between two sites. Which type of WAN connection would best fulfill this need?

Ethernet WAN

What functionality does mGRE provide to the DMVPN technology?

It allows the creation of dynamically allocated tunnels through a permanent tunnel source at the hub and dynamically allocated tunnel destinations at the spokes.

What is the best description of Trojan horse malware?

It appears as useful software but hides malicious code.

Which scenario describes the use of a public API?

It can be used with no restrictions.

In an OSPF network which two statements describe the link-state database (LSDB)? (Choose two.)

It can be viewed by using the show ip ospf database command. All routers within an area have an identical link-state database.

What is a feature of an IPS?

It can stop malicious packets

What is a purpose of establishing a network baseline?

It creates a point of reference for future network evaluations

What is the function of the key contained in most RESTful APIs?

It is used to authenticate the requesting source.

What is the main function of a hypervisor?

It is used to create and manage multiple VM instances on a host machine.

What are three benefits of cloud computing? (Choose three.)

It streamlines the IT operations of an organization by subscribing only to needed services. It enables access to organizational data anywhere and at any time. It eliminates or reduces the need for onsite IT equipment, maintenance, and management.

How is the YAML data format structure different from JSON?

It uses indentations.

Refer to the exhibit. Which data format is used to represent the data for network automation applications?

JSON

What protocol is a vendor-neutral Layer 2 discovery protocol that must be configured separately to transmit and receive information packets?

LLDP

What protocol is a vendor-neutral Layer 2 protocol that advertises the identity and capabilities of the host device to other connected network devices?

LLDP

Which two layers of the OSI model are associated with SDN network control plane functions that make forwarding decisions? (Choose two.)​

Layer 2 Layer 3

Which two IPsec protocols are used to provide data integrity?

MD5 SHA

Which type of VPN involves the forwarding of traffic over the backbone through the use of labels distributed among core routers?

MPLS VPN

A network administrator is troubleshooting an OSPF problem that involves neighbor adjacency. What should the administrator do?

Make sure that the hello and dead interval timers are the same on all routers.

In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstations and mobile devices. Which feature must be enabled on the company router in order for office devices to access the internet?

NAT

Refer to the exhibit. R1 is configured for NAT as displayed. What is wrong with the configuration?

NAT-POOL2 is not bound to ACL 1.

What protocol synchronizes with a private master clock or with a publicly available server on the internet?

NTP

What protocol uses smaller stratum numbers to indicate that the server is closer to the authorized time source than larger stratum numbers?

NTP

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

Narrow the scope.

What role do network devices play in the IntServ QoS model?

Network devices ensure that resources are available before traffic is allowed to be sent by a host through the network.

Which statement describes a characteristic of Cisco Catalyst 2960 switches?

New Cisco Catalyst 2960-C switches support PoE pass-through.

Which network traffic management technology is a basic element in SDN implementations?

OpenFlow

Refer to the exhibit. Which devices exist in the failure domain when switch S3 loses power?

PC_3 and AP_2

Match the HTTP method with the RESTful operation.

POST ->> Create GET ->> Read PUT/PATCH ->> Update/Replace?Modify Delete ->> Delete

Which term is used to describe a set of instructions for execution by the configuration management tool SaltStack?

Pillar

Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface. When following the best practices, in what location should the standard ACL be applied?

R2 G0/0 outbound

Refer to the exhibit. An administrator first configured an extended ACL as shown by the output of the show access-lists command. The administrator then edited this access-list by issuing the commands below. Router(config)# ip access-list extended 101 Router(config-ext-nacl)# no 20 Router(config-ext-nacl)# 5 permit tcp any any eq 22 Router(config-ext-nacl)# 20 deny udp any any Which two conclusions can be drawn from this new configuration?​ (Choose two.)

Ping packets will be permitted. SSH packets will be permitted

Which two configuration management tools are developed using Ruby? (Choose two.)

Puppet Chef

Refer to the exhibit. The Gigabit interfaces on both routers have been configured with subinterface numbers that match the VLAN numbers connected to them. PCs on VLAN 10 should be able to print to the P1 printer on VLAN 12. PCs on VLAN 20 should print to the printers on VLAN 22. What interface and in what direction should you place a standard ACL that allows printing to P1 from data VLAN 10, but stops the PCs on VLAN 20 from using the P1 printer? (Choose two.)

R1 Gi0/1.12 outbound

Refer to the exhibit. Which two configurations would be used to create and apply a standard access list on R1, so that only the 10.0.70.0/25 network devices are allowed to access the internal database server? (Choose two.)

R1(config)# interface GigabitEthernet0/0 R1(config-if)# ip access-group 5 out R1(config)# access-list 5 permit 10.0.70.0 0.0.0.127

Consider the following access list that allows IP phone configuration file transfers from a particular host to a TFTP server: R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000 R1(config)# access-list 105 deny ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out Which method would allow the network administrator to modify the ACL and include FTP transfers from any source IP address?

R1(config)# interface gi0/0 R1(config-if)# no ip access-group 105 out R1(config)# no access-list 105 R1(config)# access-list 105 permit udp host 10.0.70.23 host 10.0.54.5 range 1024 5000 R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 20 R1(config)# access-list 105 permit tcp any host 10.0.54.5 eq 21 R1(config)# access-list 105 deny ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out

An administrator has configured an access list on R1 to allow SSH administrative access from host 172.16.1.100. Which command correctly applies the ACL?

R1(config-line)# access-class 1 in

Refer to the exhibit. A network administrator has configured a standard ACL to permit only the two LAN networks attached to R1 to access the network that connects to R2 G0/1 interface, but not the G0/0 interface. When following the best practices, in what location should the standard ACL be applied?

R2 G0/0 outbound

What is the most widely used API for web services?

REST

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.)

Router R1 is the master, and R2 is the client The IP address of R1 is 192.168.1.2

Refer to the exhibit. If the switch reboots and all routers have to re-establish OSPF adjacencies, which routers will become the new DR and BDR?

Router R3 will become the DR and router R1 will become the BDR.

Refer to the exhibit. What is the OSPF cost to reach the router A LAN 172.16.1.0/24 from B?

Router R4 will become the DR and router R1 will become the BDR.

A network administrator is writing a standard ACL that will deny any traffic from the 172.16.0.0/16 network, but permit all other traffic. Which two commands should be used? (Choose two.)

Router(config)# access-list 95 permit any Router(config)# access-list 95 deny 172.16.0.0 0.0.255.255

Which technology virtualizes the network control plane and moves it to a centralized controller?​

SDN

What protocol allows the manager to poll agents to access information from the agent MIB?

SNMP

What protocol is used in a system that consists of three elements-a manager, agents, and an information database?

SNMP

What protocol uses agents, that reside on managed devices, to collect and store information about the device and its operation?

SNMP

Which type of VPN is the preferred choice for support and ease of deployment for remote access?

SSL VPN

For a data center, what is the difference in the server virtualization data traffic compared with the traditional client-server model?

There are significant data exchanges between virtual servers.

Refer to the exhibit. What three conclusions can be drawn from the displayed output? (Choose three.)

The DR can be reached through the GigabitEthernet 0/0 interface. There have been 9 seconds since the last hello packet sent. The router ID values were not the criteria used to select the DR and the BDR.

Refer to the exhibit. A network administrator is configuring an ACL to limit the connection to R1 vty lines to only the IT group workstations in the network 192.168.22.0/28. The administrator verifies the successful Telnet connections from a workstation with IP 192.168.22.5 to R1 before the ACL is applied. However, after the ACL is applied to the interface Fa0/0, Telnet connections are denied. What is the cause of the connection failure?

The IT group network is included in the deny statement.

Refer to the exhibit. A PC at address 10.1.1.45 is unable to access the Internet. What is the most likely cause of the problem?

The NAT pool has been exhausted.

Refer to the exhibit. An administrator is trying to back up the current running configuration of the router to a USB drive, and enters the command copy usbflash0:/R1-config running-config on the router command line. After removing the USB drive and connecting it to a PC, the administrator discovers that the running configuration was not properly backed up to the R1-config file. What is the problem?

The command that the administrator used was incorrect.

A small company is considering moving many of its data center functions to the cloud. What are three advantages of this plan? (Choose three.)

The company only needs to pay for the amount of processing and storage capacity that it uses The company does not need to be concerned about how to handle increasing data storage and processing demands with in-house data center equipment. The company can increase processing and storage capacity as needed and then decrease capacity when it is no longer needed.

What is a characteristic of the two-tier spine-leaf topology of the Cisco ACI fabric architecture?​

The leaf switches always attach to the spines, but they never attach to each other.

Refer to the exhibit. Router R1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no connectivity between the web server and users on the Internet. What is a possible reason for this lack of connectivity?

The router NAT configuration has an incorrect inside local address.

Refer to the exhibit. A network administrator has configured ACL 9 as shown. Users on the 172.31.1.0 /24 network cannot forward traffic through router CiscoVille. What is the most likely cause of the traffic failure?

The sequence of the ACEs is incorrect

Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco.com is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)

There is a problem with the web server software on web-s1.cisco.com. DNS cannot resolve the IP address for the server web-s1.cisco.com.

What are two benefits of using SNMP traps? (Choose two.)

They eliminate the need for some periodic polling requests. They reduce the load on network and agent resources.

Which statement describes a characteristic of standard IPv4 ACLs?

They filter traffic based on source IP addresses only.

Because of enormous growth in web traffic, a company has planned to purchase additional servers to help handle the web traffic. What service or technology would support this requirement?

dedicated servers

Refer to the exhibit. The network administrator that has the IP address of 10.0.70.23/25 needs to have access to the corporate FTP server (10.0.54.5/28). The FTP server is also a web server that is accessible to all internal employees on networks within the 10.x.x.x address. No other traffic should be allowed to this server. Which extended ACL would be used to filter this traffic, and how would this ACL be applied? (Choose two.)

access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 20 access-list 105 permit tcp host 10.0.70.23 host 10.0.54.5 eq 21 access-list 105 permit tcp 10.0.0.0 0.255.255.255 host 10.0.54.5 eq www access-list 105 deny ip any host 10.0.54.5 access-list 105 permit ip any any R1(config)# interface gi0/0 R1(config-if)# ip access-group 105 out

In an OSPF network which OSPF structure is used to create the neighbor table on a router?

adjacency database

Which three traffic-related factors would influence selecting a particular WAN link type? (Choose three.)

amount of traffic security needs type of traffic

What are two types of attacks used on DNS open resolvers? (Choose two.)

amplification and reflection resource utilization

In JSON, what is held within square brackets [ ]?

an array

A network technician is configuring SNMPv3 and has set a security level of auth . What is the effect of this setting?

authenticates a packet by using either the HMAC with MD5 method or the SHA method

A group of users on the same network are all complaining about their computers running slowly. After investigating, the technician determines that these computers are part of a zombie network. Which type of malware is used to control these computers?

botnet

Which step in the link-state routing process is described by a router building a link-state database based on received LSAs?

building the topology table

Which step in the link-state routing process is described by a router inserting best paths into the routing table?

choosing the best route

What QoS step must occur before packets can be marked?

classifying

What command would be used as part of configuring NAT or PAT to clear dynamic entries before the timeout has expired?

clear ip nat translation

A student, doing a summer semester of study overseas, has taken hundreds of pictures on a smartphone and wants to back them up in case of loss. What service or technology would support this requirement?

cloud services

Anycompany has decided to reduce its environmental footprint by reducing energy costs, moving to a smaller facility, and promoting telecommuting. What service or technology would support this requirement?

cloud services

In a large enterprise network, which two functions are performed by routers at the distribution layer? (Choose two.)

connect remote networks provide data traffic security

Which two scenarios would result in a duplex mismatch? (Choose two.)

connecting a device with autonegotiation to another that is manually set to full-duplex manually setting the two connected devices to different duplex modes

Which component in a traditional infrastructure device provides Layer 2 and Layer 3 functions to create data paths within a network?

control plane

What type of network uses one common infrastructure to carry voice, data, and video signals?

converged

What is the name of the layer in the Cisco borderless switched network design that is considered to be the backbone used for high-speed connectivity and fault isolation?

core

What type of traffic is described as consisting of traffic that gets a lower priority if it is not mission-critical?

data

What type of traffic is described as consisting of traffic that requires a higher priority if interactive?

data

What type of traffic is described as not resilient to loss?

data

What type of traffic is described as using either TCP or UDP depending on the need for error recovery?

data

A network administrator has been tasked with creating a disaster recovery plan. As part of this plan, the administrator is looking for a backup site for all of the data on the company servers. What service or technology would support this requirement?

data center

Which type of OSPFv2 packet contains an abbreviated list of the LSDB of a sending router and is used by receiving routers to check against the local LSDB?

database description

Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)

interface identifier connection type

Which cloud computing opportunity would provide the use of network hardware such as routers and switches for a particular company?

infrastructure as a service (IaaS)

Which is a characteristic of a Type 1 hypervisor?​

installed directly on a server​


संबंधित स्टडी सेट्स

Ch. 35 Pathogenicity and Infection

View Set

Profiling: How to tell when someone is Lying

View Set